Saturday, October 15, 2016

Social Engineering Attacks

fit to, societal Engineering: Hacking the Wetw be! by Applegate Scott, genial engineering is a methodological analysis that allows an attacker to bypass technical foul control by fight the human element in an organization. The article also states that kindly engineering is very effective, because attackers fair game weak someone and organizations to fool access (Scott). Hacking Techniques (sidebar). Attacker has disparate ways to break in to computers, and gain access without the proprietor knowing their device is compromised or apply (Hacking Techniques (sidebar). Hackers use different methods to gain an authorized access, molest computer system of rules, or err sensitive information from individuals computer such methods includes Trojan horse, virus, Impersonation, shoulder surfing, and dumpster diving. Hacking a computer is non something sore however, it has been around since 1960. Group of hackers started to try with computer that is located college campuses (co mputer hackers). However, those hackers need was to improve the computer system, and did not have any worry to steal information or damage any devices. In 1970, hackers become to use their skills in a malicious and turn ways and in 1980 they created groups where they overlap their hacking techniques (Computer Hacking). Hacking is not only found on stealing or breaking into companies or individuals system, only it also has become a way where rival countries extract cyber-war against each other. In April 2001, for congressman a U.S. surveillance aircraft collided with a Chinese fighter spurt near Chinas Southern coast, causing tensions to illumination between the two countries.\nAccording to Social Engineering: Hacking the Wetw are! By Applegate Scott Phishing and Trojan e-mail are two common affable engineering attacks. These two techniques are required victims to open email attachment, and can be used to compromise the security of the system and privacy (Sc...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.