preview

Social Engineering : What Makes A Real Protected System Vulnerable?

Better Essays

Introduction
The expression “Social Engineering” is used to point out the ability of an individual to use some of the characteristics of the human nature in order to accomplish their personal goals. Social engineering can be used to control a large number of individuals using a variety of means such as ruling, media etc.
But another meaning of social engineering that relates more to information security than political sciences is the act of psychologically directing humans in such a way to make them reveal sensitive information or perform some tasks. So this report aims at answering question with regards to the identity of a typical social engineer, what the techniques used by social engineers are, what makes a real protected system …show more content…

Anyway, in a world driven by cognitive bias social engineers are all set to do their business as their believe it is fair and rational; on the other hand victims are also all set to be hacks due to lack of effectiveness in information processing.
An ordinary social engineer would be interested in finding various exploits in order to accomplish his goal. In the process, he will friendly interact with human and tries to extract or compromise information as a result. One strategy that a social engineering would use is to find a way to infiltrate the targeted community. For this he needs to dress properly and adopts some respectable and unsuspicious behavior vis-a-vis of the target. The hacker may play a diverse roles and on the occasion supply credential in such a way to establish legitimacy in the mind of the victim. Before the victim realizes, the attacker would have already sunk all the needs information from the victim.
This scenario happens more frequently over the modern mean of communication such as phone and internetworked computers. For instance, a hacker may watch the product that the victim has visited on Amazon. This is possible from the stand point that the TCP connection between the victim’s terminal and Amazon’s server is still unsecure until the victim decides to check a product out. But, regardless of whether the victim has check out a product or not, the hacker can still contact him with the assumption that victim had

Get Access