Thursday, September 26, 2019

Cyber crime,the social engineering Essay Example | Topics and Well Written Essays - 500 words

Cyber crime,the social engineering - Essay Example Today social engineering has become a nuisance to many people as the cybercrime techniques improve and spread widely. Those committing the offenses tend to manipulate the victims into believing false information to obtain personal or organizations crucial information. Cybercrimes pay as some of the social engineering obtains payments through targeting specific organization information. The internet as a social engineer leads to over reliance on information provided through the internet. People meet through the social network and share information without their physical knowledge, thus promoting cybercrime. People act upon the received emails, telephones, mobiles and faxes from others they are unfamiliar with. It is becasue of the the ability to believe what others say. People, in many cases, act as the weak links to cybercrime as the hackers target the human nature and obtain a response. The social engineers tend to be charming or at times use their appearance and hold false authorit y. Ruse acts as a key while the parody and disguise is through speech, physical disguise or documents (Brenner 2010 page 40-96). Face to face communication proves to be the best form of information exchange as people obtain direct feedback. Physical reactions are evident and direct responses are made unlike communication through the internet. The social engineers use tricks and technology to obtain information that is difficult to track. The engineers have good knowledge on the use of computers and ways to prevent their arrest. Social engineering through the internet is easy to deal with as phone numbers are tracked leading to the social engineer. Though the act of spoofing provides a social engineer with the name, and number of the caller that permits the callers to forge their identity, social engineering still proves difficult to deal with. Web spoofing allows scanning of documents and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.