Tuesday, December 27, 2016

Social Engineering Attacks

harmonise to, brotherly Engineering: Hacking the Wetw atomic number 18! by Applegate Scott, complaisant engineering is a methodology that allows an attacker to bypass practiced control by assail the human element in an organization. The article also states that hearty engineering is very effective, because attackers heading weak several(prenominal) and organizations to hand access (Scott). Hacking Techniques (sidebar). Attacker has dissimilar ways to break in to computers, and gain access without the possessor knowing their device is compromised or employ (Hacking Techniques (sidebar). Hackers use different methods to gain an authorized access, constipation computer placement, or splay sensitive information from individuals computer much(prenominal) methods includes Trojan horse, virus, Impersonation, shoulder surfing, and dumpster diving. Hacking a computer is non something current however, it has been around since 1960. Group of hackers started to prove with co mputer that is located college campuses (computer hackers). However, those hackers motive was to improve the computer system, and did not have any caution to steal information or damage any devices. In 1970, hackers become to use their skills in a malicious and culpable ways and in 1980 they created groups where they sh ard out their hacking techniques (Computer Hacking). Hacking is not only found on stealing or breaking into companies or individuals system, only when it also has become a way where rival countries exact cyber-war against each other. In April 2001, for exemplar a U.S. surveillance aircraft collided with a Chinese fighter one thousand near Chinas Southern coast, causing tensions to glare between the two countries.\nAccording to Social Engineering: Hacking the Wetware! By Applegate Scott Phishing and Trojan telecommunicate are two common well-disposed engineering attacks. These two techniques are required victims to open email attachment, and can be used to compromise the security of the system and privacy (Sc...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.