This document discusses social engineering tactics used in cyber warfare and applications. It explores spear phishing attacks on social media platforms and phishing attacks through fake websites. It also covers the issues of cyberbullying and cyber stalking. References are provided for further reading.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1 Social Engineering Francis Ogunjimi Grand Canyon University Cyber Warfare and Applications Dr. Sean Atkinson 24thAugust , 2022.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 PART 1 In order to build a spear phishing assault that targets a user of Facebook, Instagram, or LinkedIn, I would lure the user using a page that looks exactly like Facebook and then pose it as a security alert or password-reset request. Users of social media share a common dread of having their accounts locked, if one looks at the psychology of these users. A warning that the user's account might be blocked at any time if they don't update their password may send shivers down their spine, forcing them to immediately follow the method. Including a few extra questions, such the user's birthdates, can help allay suspicions while also revealing a lot about the individual. (Hong, J. ,2012) For a phishing attack, I would make a phony website—for instance, one for Coca-Cola—that seems real and, when clicked, asks the user to input their information to be eligible for an offer. This can be done simply copying the webpage of the real company and adding a few fictitious remarks to the bottom of the form. Using myschool.edu/finance as opposed to a misspelled domain name Myschool.edu.finance.com could be used instead. The user might not be aware of an attack because of the similarities. Attackers can reach thousands of people with phishing emails, and some of them might fall for the scam, causing them to lose money or crucial information.
3 References Hong, J. (2012). The state of phishing attacks.Communications of the ACM,55(1), 74-81. Laszka, A., Vorobeychik, Y., & Koutsoukos, X. (2015, February). Optimal personalized filtering against spear-phishing attacks. InProceedings of the AAAI Conference on Artificial Intelligence(Vol. 29, No. 1) Alkhalil,Z.,Hewage,C.,Nawaf,L.,&Khan,I.(2021).PhishingAttacks:Recent Comprehensive Study and a New Anatomy.Frontiers in Computer Science,3, 6.
4 PART 2 Cybersecurity is a growing problem that needs to be addressed. These actions are carried out, in part, by terrorist groups and anyone looking to make quick cash from a foreign government. Behavior is defined as morality, which includes what is good, right, and wrong. Cyberspace The responsibility of one's online behavior is referred to as morality. (Essaaidi & Bennasar, 2017) Online shoppers also used living beings flesh websites, a Cantonese euphemism for their desire to locate a particular individual in order to engage in premeditated verbal harassment against it. Cyberbullying can involve spreading false information or rumors about a single man in order to undermine the defendant's reputation, relationships, and job. On websites, social media, message boards, the internet, and some other digital platforms, false information is disseminated with the intentionofhurtingpeople'sdecisionsandthereputationsoforganizations.(Dogaru& Dumitrache, 2017). The term "cyber stalking" refers to a pattern of actions or conduct used over time to harm, scare, terrify, or humiliate someone, including the relatives of the deceased, lovers, or coworkers. These actions and behaviors include, but are not limited to, bombarding the customer's inbox with messages, frequently placing advertisements on their user's news websites, sites like Instagram, and persistently calling them. Be watchful and watch the universe with a vision that reveresGod.Theunintendedconsequencesofouradvertising,alerts,andotherpublic information must be taken into account. In this aspect, we must consider whether we will be building His unique rule or obeying Him. (Pavur & Martinovic, 2020). Another of God's Laws to His followers is "don't really steal." Not hardly can we not cheat as Evangelical data scientists, even but we have complete skills to do just that, and we already avoid loss by safeguarding data management. We assess both those programs and fix them as thieves discover or abuse them. Ethical hackers now employ much of the same talents as fraudsters, and rather than violent fraud, they use them to safeguard networks and preserve evidence. These respected experts work to prevent as well as counter criminal activity. "The Law of the LORD is perfect," says Psalms 19:7-10, saying, "The LORD's judgments are genuine and upright entirely." (Myftari, 2021).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5 It is essential to properly respect an individual's legal and social base in any place of authority, such as network security, policeman, medics, instructors, and the like. The base is laid by a solid Religious religion and an ongoing journey with Christ.
6 Reference Bennasar, H., Bendahmane, A., &Essaaidi, M. (2017, April). An overview of the state-of-the-art of cloud computing cyber-security. InInternational Conference on Codes, Cryptology, and Information Security(pp. 56-67). Springer, Cham. Dogaru, D. I., &Dumitrache, I. (2017, June). Cyber security in healthcare networks. In2017 E- Health and Bioengineering Conference (EHB)(pp. 414-417). IEEE. Pavur, J., &Martinovic, I. (2020). SOK: Building a launchpad for impactful satellite cyber- security research.arXiv preprint arXiv:2010.10872. Myftari, K. (2021). Beyond the Impasse: Prospects for Joint Cooperation between Russia and the US in Cybersecurity.