Wednesday, May 8, 2019

Cyber crime,the social engineering Essay Example | Topics and Well Written Essays - 500 words

Cyber crime,the social applied science - Essay ExampleToday social plan has become a nuisance to many people as the cybercrime techniques improve and spread widely. Those committing the offenses tend to manipulate the victims into believing spurious info to have personal or organizations crucial in formation. Cybercrimes pay as some of the social engineering obtains payments by means of targeting specific organization breeding. The internet as a social engineer leads to over trust on information provided through the internet. People meet through the social network and share information without their physical knowledge, thus promoting cybercrime. People act upon the received emails, telephones, mobiles and faxes from others they are unfamiliar with. It is becasue of the the ability to believe what others say. People, in many cases, act as the weak links to cybercrime as the hackers target the human nature and obtain a response. The social engineers tend to be charming or at t imes use their visual aspect and hold false authority. Ruse acts as a key while the parody and disguise is through speech, physical disguise or documents (Brenner 2010 page 40-96).Face to face communication proves to be the best form of information exchange as people obtain take away feedback. Physical reactions are evident and direct responses are made unlike communication through the internet. The social engineers use tricks and technology to obtain information that is difficult to track. The engineers have good knowledge on the use of computers and ways to prevent their arrest. Social engineering through the internet is easy to deal with as phone numbers are tracked take to the social engineer. Though the act of spoofing provides a social engineer with the name, and number of the caller that permits the callers to forge their identity, social engineering still proves difficult to deal with. Web spoofing allows scanning of documents and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.