Perform a search on stories about social engineering attacks

Assignment Help Management Information Sys
Reference no: EM132051192

Written Assignment

Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization. Write a 2-page paper on three or four of the most important suggestions from the plan you select.

You must provide a reference to the site where you found the governance plan, in APA format.

2 Discussion Question.

Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented.

Directions:

Students are required to post one original response to the discussion questions each week, as well as a response to one classmate. Original responses should not be a word for word rehashing of what is stated in the readings, but rather an integration of the concepts and additional insights, either from real world experience or additional sources. It should be a 250 word response to the question Your primary posting may end with a tag-line or a related question of your own.

3). Responses to classmates should not be "I agree" or "I like the way you stated that." These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 125 words. See APA criteria for citing resources. You must provide a minimum of a reference, in APA format, in your original response.

Response to classmate is :

Typically, most of the hacking in today's world seem to be caused by infecting systems with malwares like virus, logical bombs etc. But there is another set of hackers who target the most vulnerable part of any organization: Human psychology. They use procedures which the employee uses in daily basis like E-mail, telephonic calls etc. and thus making it very susceptible. These attacks are also called as Social Engineering attacks. Five common social engineering attacks are as follows:

PHISHING: Phishing is one of the most commonly methods used to get user's personal and financial information. This attacks reach individuals in form of mails or telephonic calls where the user is tricked to give information.

PRETEXTING: Pretexting is when the hackers create a scenario such that it looks genuine to the target and they give in information or access to the attacker party. Example would be when an outsider tries to get into organization by faking identity and lost entry pass.

BAITING: Baiting is similar to Phishing, but here the target is also enticed with gifts and prizes. Baiting usually happens when user tries to download a movie or music, where the target is made to surrender the login credentials. Baiting are also done using physical media devices like USB, Hard disk etc. Next time when you find USB or Hardrive in your parking lot, it might be baiting.

QUID PRO QUO: This is similar to baiting except the prize promised is a service. In these types of attacks, the hackers keep calling or disturbing the target and when target raise a question about the same, they are enticed with getting rid of that problem if the target disable firewall or AV temporarily. This is very serious issue in itself.

TAILGATING: Tailgating is when attackers follows an employee and gets a unauthorized access into the office or server room.

Social engineering attacks are increasing in alarming rate and the target can never guess it until it happens. In 2007, a person with box of chocolates and his charm gained confidence of ABN Amro Bank , Belgium and walked out with up to 120000 carats gem stones. He not only tricked the security personal to give a duplicate key but also let him know the locker number. Consistent training and practicing alertness is the only way to overcome social engineering attacks.

Reference no: EM132051192

Questions Cloud

What is the pressure experienced by the balloon : If the final volume of the balloon is 144.53 L at a temperature of 5.24 °C, what is the pressure experienced by the balloon as it clears Mount Crumpet?
The call option and the exchange rate : Suppose you bought the call option and the exchange rate ends up being $1 = .77 Euros.
Under parity conditions-all countries should have the same : Under Parity Conditions, all countries should have the same _____.
What is the value of the call option now : The price of Build A Fire Corp. stock will be either $94 or $123 at the end of the year. Call options are available with one year to expiration.
Perform a search on stories about social engineering attacks : Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization.
Percentage of energy is used to do workagainst atmosphere : Assume that the molar enthalpy of vaporization of water at 365.K is37.32kJ/mol. What percentage of the energy is used to do workagainst the atmosphere?
What was the change in ph of the solution : To this solution was added 50.0 mL of 0.15 Mhydrochloric acid (HCl). What was the change in pH of the solution?
What is the price of the bond in relation to par value : The price of a 5 year, 9 1/2% bond that is being priced to yield 12%. The par value is assumed to be $ 1,000. Before any calculation what is the price.
Cross rate be between canadian dollars and pesos : What should the cross rate be between Canadian Dollars and Pesos?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify someone who is having a problem with technology

Identify someone who is having a problem with technology. The problem should not be simple or simplistic in nature. The person you assist cannot be yourself or someone who is currently living with you.

  How the processor architecture supports virtual memory

Summarize how the processor architecture supports virtual memory. Identify at least two advantages and two disadvantages in its virtual memory support. Explain what effects (positive or negative) the architecture's virtual memory support has on appli..

  Information management system - explain the function and

information management system - explain the function and importance of the 4 external and the 6 internal considerations

  Describe the usability properties of interactive systems

Evaluate how section 508 affects developing user interfaces and assess this compliancy standard's impact on users. Give three (3) examples of available tools for verifying that your interfaces meet universal design guidelines and the advantages and..

  What roles can computerized maintenance management systems

How can a manager evaluate the effectiveness of the maintenance function? -  How does machine design contribute to either increasing or alleviating the maintenance problem?

  Using mysql create a database with a table named noveltitles

Using MySql create a Database with a table named NovelTitles that has the following attributes Novel Name, Author, Genre, Main Character and Rating/Review.Create an HTML Form that allows the above attributes to be added/deleted to the data base

  Describing issues might face when maintaining security

Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries

  Describe a situation in your internship or previous work

Describe a situation in your internship, or previous work, where you have taken account of an Australian Standard in fulfilling your ICT task, and why.

  Optimizing reverse logistics supply chain1 select a minimum

optimizing reverse logistics supply chain1. select a minimum of two industries or specific companies and identify how

  Develop a data model that will retain student records

Develop a data model that will retain student records and perform various data extract transform and load (ETL) processes.

  The system requirement variables and software requirements

Determine whether or not you believe that system requirements outweigh software requirements when it comes to usability of this computer.

  Best solution guide for cloud computing for the consumer

Write 7 pager Research Paper for Best solution guide for Cloud Computing for the consumer. Please also list 5 Annotated Bibliographies

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd