Tuesday, June 18, 2019

Cyber crime,the social engineering Essay Example | Topics and Well Written Essays - 500 words

Cyber crime,the mixer engineering - Essay ExampleToday social engineering has become a nuisance to many populate as the cybercrime techniques improve and spread widely. Those committing the offenses tend to manipulate the victims into believing false information to apply personal or organizations crucial information. Cybercrimes pay as some of the social engineering obtains payments through targeting specific organization information. The internet as a social engineer leads to over reliance on information provided through the internet. citizenry meet through the social network and share information without their physical knowledge, thus promoting cybercrime. People act upon the received emails, telephones, mobiles and faxes from others they are unfamiliar with. It is becasue of the the ability to trust what others say. People, in many cases, act as the weak links to cybercrime as the hackers target the human nature and obtain a response. The social engineers tend to be charming or at times use their appearance and hold false authority. Ruse acts as a key while the parody and inter is through speech, physical disguise or documents (Brenner 2010 page 40-96).Face to face communication proves to be the best form of information exchange as people obtain direct feedback. Physical reactions are evident and direct responses are made unlike communication through the internet. The social engineers use tricks and technology to obtain information that is difficult to track. The engineers have good knowledge on the use of computers and ways to prevent their arrest. Social engineering through the internet is easy to study with as phone numbers are tracked leading to the social engineer. Though the act of spoofing provides a social engineer with the name, and number of the caller that permits the callers to gush their identity, social engineering still proves difficult to deal with. Web spoofing allows scanning of documents and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.