Perform a search on stories about social engineering attacks

Assignment Help Management Information Sys
Reference no: EM132051192

Written Assignment

Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization. Write a 2-page paper on three or four of the most important suggestions from the plan you select.

You must provide a reference to the site where you found the governance plan, in APA format.

2 Discussion Question.

Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented.

Directions:

Students are required to post one original response to the discussion questions each week, as well as a response to one classmate. Original responses should not be a word for word rehashing of what is stated in the readings, but rather an integration of the concepts and additional insights, either from real world experience or additional sources. It should be a 250 word response to the question Your primary posting may end with a tag-line or a related question of your own.

3). Responses to classmates should not be "I agree" or "I like the way you stated that." These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 125 words. See APA criteria for citing resources. You must provide a minimum of a reference, in APA format, in your original response.

Response to classmate is :

Typically, most of the hacking in today's world seem to be caused by infecting systems with malwares like virus, logical bombs etc. But there is another set of hackers who target the most vulnerable part of any organization: Human psychology. They use procedures which the employee uses in daily basis like E-mail, telephonic calls etc. and thus making it very susceptible. These attacks are also called as Social Engineering attacks. Five common social engineering attacks are as follows:

PHISHING: Phishing is one of the most commonly methods used to get user's personal and financial information. This attacks reach individuals in form of mails or telephonic calls where the user is tricked to give information.

PRETEXTING: Pretexting is when the hackers create a scenario such that it looks genuine to the target and they give in information or access to the attacker party. Example would be when an outsider tries to get into organization by faking identity and lost entry pass.

BAITING: Baiting is similar to Phishing, but here the target is also enticed with gifts and prizes. Baiting usually happens when user tries to download a movie or music, where the target is made to surrender the login credentials. Baiting are also done using physical media devices like USB, Hard disk etc. Next time when you find USB or Hardrive in your parking lot, it might be baiting.

QUID PRO QUO: This is similar to baiting except the prize promised is a service. In these types of attacks, the hackers keep calling or disturbing the target and when target raise a question about the same, they are enticed with getting rid of that problem if the target disable firewall or AV temporarily. This is very serious issue in itself.

TAILGATING: Tailgating is when attackers follows an employee and gets a unauthorized access into the office or server room.

Social engineering attacks are increasing in alarming rate and the target can never guess it until it happens. In 2007, a person with box of chocolates and his charm gained confidence of ABN Amro Bank , Belgium and walked out with up to 120000 carats gem stones. He not only tricked the security personal to give a duplicate key but also let him know the locker number. Consistent training and practicing alertness is the only way to overcome social engineering attacks.

Reference no: EM132051192

Questions Cloud

What is the pressure experienced by the balloon : If the final volume of the balloon is 144.53 L at a temperature of 5.24 °C, what is the pressure experienced by the balloon as it clears Mount Crumpet?
The call option and the exchange rate : Suppose you bought the call option and the exchange rate ends up being $1 = .77 Euros.
Under parity conditions-all countries should have the same : Under Parity Conditions, all countries should have the same _____.
What is the value of the call option now : The price of Build A Fire Corp. stock will be either $94 or $123 at the end of the year. Call options are available with one year to expiration.
Perform a search on stories about social engineering attacks : Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization.
Percentage of energy is used to do workagainst atmosphere : Assume that the molar enthalpy of vaporization of water at 365.K is37.32kJ/mol. What percentage of the energy is used to do workagainst the atmosphere?
What was the change in ph of the solution : To this solution was added 50.0 mL of 0.15 Mhydrochloric acid (HCl). What was the change in pH of the solution?
What is the price of the bond in relation to par value : The price of a 5 year, 9 1/2% bond that is being priced to yield 12%. The par value is assumed to be $ 1,000. Before any calculation what is the price.
Cross rate be between canadian dollars and pesos : What should the cross rate be between Canadian Dollars and Pesos?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd