Sign In
Not register? Register Now!
Pages:
1 page/≈275 words
Sources:
4 Sources
Style:
MLA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:

Social Engineering and Internal Threats

Essay Instructions:

Question 1) Social Engineering
Social Engineering attacks have been very successful in the past in attacking our networks. Describe how these social engineering attacks are carried out to attack the targets. And, explain how we could mitigate them.
Question 2) Internal Threats
As you may know or will soon learn, our users are the biggest threats to our networks. They like doing things like plugging in their iPods, or going to websites and downloading programs that have malicious code embedded in them. With that thought in mind, name two things you can do that would help protect your network from the problems that users could cause. Explain why you think these things would work.

Essay Sample Content Preview:
Institution:
Course Title:
Instructor:
Date:
How social engineering attacks are carried out
Social engineering has been used as an art utilizing human behavior to interfere with security, without the participant realizing that manipulation has occurred. One of the common techniques used in social engineering is the direct approach. Occurs when an individual who not actually the owner of the computer tries to log in the system. He accesses the network and the other persons database causing corruption of the system without having his identity revealed (Sans institute, 2003). Spying ad eavesdropping is mostly used as the spy observes the user typing in their user name and password therefore providing the spy with an avenue of getting to an individual information. Huckers at some point may pretend to be responding to an individual’s request in a bid to provide help. Once the individual gives them their trust and opens up to the opportunity, exploitation is done through commands which makes criminals get back to the individual’s computer. Most times, hijackers also use an individual’s email so that they can get access to that individual’s contact list. Once the criminals are in control of an individual email, they send emails to everyone on their contact lists and even get to the person’s friend’s friend’s. (W...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These MLA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!