preview

Social Engineering Attacks On Critical Infrastructures

Decent Essays

Social Engineering Attacks on critical infrastructures do not always target the vulnerabilities in the systems themselves. One of the weakest links in security is the human factor. Social engineering targets this, and it has worked very effectively for them. According to Raj Samani and Charles McFarland, social engineering is “the deliberate application of deceitful techniques designed to manipulate someone into divulging information or performing actions that may result in the release of that information” (Samani and McFarland 6). Social engineering attacks are divided into two categories: hunting and farming. In hunting, the attacker wants to extract information from the target with little interaction. An example would be a phishing …show more content…

An example of the four phases in a phishing attack would be gathering information about the target in phase one, sending an email to the target that states the purpose in phase two, asking the target to provide credentials as a recommendation or a required action in phase three, and ending the interaction once the credentials are provided in phase four. To defend against social engineering, it is important for organizations to have an active awareness training program. There are a number of actions that organizations can take to mitigate risks from social engineering attacks. On the human side, staff should be aware of social engineering threats and what their roles and responsibilities are when facing such attacks. Social engineers understand that people would prefer not to confront somebody in most situations, and they take advantage of this weakness. Employees should be encouraged to challenge individuals who are not following organizations’ policies, like not wearing employee identification badge for example. Also, companies should have a strong password policy and employees should be aware that they should not write the password down. Employees need to understand not to leave confidential documents in plain sight and shred the documents when they want to discard them. More importantly, organizations should try not to blame employees when social engineering attacks happen as the employees are the victims of

Get Access