logo

Effectiveness of Social Engineering

   

Added on  2020-05-16

5 Pages782 Words81 Views
Running head: SOCIAL ENGINEERINGSOCIAL ENGINEERINGName of the Student:Name of the University:Author Note:

SOCIAL ENGINEERING1Social Engineering Social engineering is the technique of getting access to the sensitive and confidentialinformation from the system. Social engineering needs less technological knowledge to gain theaccess of the system (Conteh and Schmick 2016). The effectiveness of social engineeringdepends on the manipulation of human beings. Working environment in the office:The company is a web hosting company. There are 200 employees working in thecompany. The company works with both Windows and Linux hosting servers. The companyprovides free hosting to its clients, in the return the client has to allow the company to run theiradvertisement on the web page. There are four server computers and approximately 200 laptopsfor the official use. The database is managed by the SQL server.Recently the company officials are afraid of the data loss as a result of social engineering.Types of possible attacks that may happen:Phishing:Phishing is the most common form of attacks that comes under social engineering. About77% of the systems are the victim of phishing (Krombholz et al. 2015). The phishing can bedone by masquerading a trusted contact and steal information through it. It can be done throughthe email or sending the malicious link to the users.The consequence of the attack on the company (analysis of the potential damage)Some of the customers of the company has reported that some suspicious emails weresent to them on behalf of the company stating that they have won some interesting prize in the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Professional Issues in Computing - Assignment
|5
|774
|82

CSI2102 - Information Security - Assignment
|11
|2643
|76

Assignment on Computer security (pdf)
|13
|3200
|96

Software Security Assignment
|5
|999
|61