logo

Telecommunications and Network Security

   

Added on  2022-11-29

14 Pages3056 Words412 Views
 | 
 | 
 | 
Running head: TELECOMMUNICATIONS AND NETWORK SECURITY
Telecommunications and Network Security
[Name of the Student]
[Name of the University]
[Author note]
Telecommunications and Network Security_1

TELECOMMUNICATIONS AND NETWORK SECURITY1
Table of Contents
Introduction:....................................................................................................................................2
Discussion:.......................................................................................................................................2
Social engineering working process:...........................................................................................2
Social engineering Attacks:.........................................................................................................4
Social Surf:..............................................................................................................................4
Ways of preventing Shoulder Surfing:....................................................................................4
Phishing:..................................................................................................................................5
Prevention of Phishing:............................................................................................................6
Baiting:....................................................................................................................................7
Prevention of Baiting:..............................................................................................................8
Scareware:................................................................................................................................8
Prevention of Sareware:...........................................................................................................9
References:....................................................................................................................................10
Telecommunications and Network Security_2

TELECOMMUNICATIONS AND NETWORK SECURITY2
Introduction:
Social Engineering is generally considered to be process of manipulating peoples for
giving up of their confidential information. The information, which these type of criminal seeks
is seen to be varying however whenever a criminal are associated with targeting an individual,
they generally indulge themselves in tricking the victims in giving away their passwords or any
kind of account related information or might also provide the access of their computers so as to
make the criminals become capable of secretly installing the malicious software (Krombholz et
al., 2015). This malicious software in turn would be associated with providing a full access of the
computer to the criminal or the password or any kind of bank related information enabling them
in having full control of the victim’s computers.
Social engineering tactics is used by the criminals mainly because it can be conducted
easily helping them in exploiting the natural inclination to trust rather than finding of ways to
hack into the software which is a complicated process (Heartfield & Loukas, 2016). The
criminals easily manipulates the users of the computing systems making them revel the
confidential information which is then utilized by the criminals for gaining an access which is
entirely unauthorized to the computer systems.
Discussion:
Social engineering working process:
The working process of social engineering can be categorized into different stages and the stages
have been described below:
Telecommunications and Network Security_3

TELECOMMUNICATIONS AND NETWORK SECURITY3
Gathering Information: This is considered to be the first stage and in this process the criminal
learns as much as they can about the victim which they have intended to attack. The information
is generally seen to be gathered from the company websites as well as from other publications
and also sometimes by means of having a conversation with the users of the system which has
been targeted.
Planning an Attack: This is the second stage in which the attacker is associated with making an
outline of the attacking process which they intends to execute for conducting the attack.
Acquiring tools: These is mainly associated with including the computer programs which is to
be used by the attacker so as to launch the entire attack.
Attack: This is the stage in which the exploitation of the weaknesses of the targeted system is
done (Shi et al., 2019).
Usage of the Acquired Knowledge: The information which are gathered at the time of social
engineering tactics like the pet names or birthdates of the organization and many more is
generally seen to be used in the attacks like the guessing of the passwords.
Telecommunications and Network Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Social Engineering Attacks: Phishing Attacks
|11
|653
|328

Assignment on Risks and Risk Management
|11
|781
|13

Phishing Attacks: Research and Defense Strategies
|8
|2164
|404

Information Security Awareness Assignment PDF
|7
|1466
|95

Effectiveness of Social Engineering
|5
|782
|81

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491