Review problem related to social engineering attacks

Assignment Help Management Information Sys
Reference no: EM132218775

Question: Social Engineering Attacks are the most common form of cyber-attacks as it mainly deals with manipulating users over online by sending different text messages, links and files over the Internet. The hacker will wait for the user to make a mistake by clicking them and gains access, steals the data accordingly (Conklin, White, Williams, Davis, & Cothren, 2010). One of the examples of Social Engineering victim is the Ubiquiti Networks Company related to computer networking Industry operates from the United States. In the year 2015, the company had lost about $46.7 million due to the phishing attack by the hackers who mainly targeted the employees, managers by impersonating them and making fake messages and requests through emails (Hackett, 2015). The phishing worked well for the hackers and they were able to transfer the money into their accounts by gaining the access whenever the manager or employees access the fake messages. It made a huge impact on the company as they were only able to recover only $8.1 million.

There are certain measures that could have prevented the Ubiquiti networks company against such social engineering attacks. The first measure would be the implementation of two-factor authentication for each system that is utilized by the employees. The phone-based verification is very popular using OTP's and it should be linked with every system that helps in restricting majority of the attacks. Goyal et al. suggested to adopt the hash functions and random number generating techniques at sender and receiver for secured connection while dealing with both the mobile and desktop systems (Goyal, Vakil, Parmar, Jain, & Jinwala, 2015). Software's for spam filters and firewalls will be appropriate to restrict such attacks further.

References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2010). Principles of Computer Security; Second Edition. New York: Tata McGraw-Hill Education.

Goyal, T., Vakil, A., Parmar, D., Jain, R., & Jinwala, D. C. (2015). Preventing Phishing Attacks: A Novel Approach. International Journal of Computer Applications, Vol. 121, No. 14, 8-12.

Hackett, R. (2015, August 10). Fraudsters duped this company into handing over $40 million. Retrieved from fortune.com.

Reference no: EM132218775

Questions Cloud

What can teresa do to resolve the problem : What can Teresa do to resolve the problem? What learning and perception factors should she consider as she analyzes the situation?
Explain reasons for decline of union density in Australia : Explain the reasons for the decline of union density in Australia over the last 20 years or so and the consequences of this decline
What factors influence the way we perceive people : What factors influence the way we perceive people? How might these factors influence the judgments an interviewer makes about a job applicant?
Discussion-implementing erm in higher education environment : Chapter 6 presented the approach the LEGO Group used to implement ERM, and chapter 9 presented a discussion and case study on implementing ERM in a higher.
Review problem related to social engineering attacks : Social Engineering Attacks are the most common form of cyber-attacks as it mainly deals with manipulating users over online by sending different text messages.
Briefly compare and contrast the two committees : Briefly compare and contrast the two committees. Identify what each committee is working on currently. Identify if author has a bias and explain with examples
Discuss implementation issues in the e- commerce management : CIS8100 E-commerce Implementation Report & Prototype Website - discuss implementation issues in the e- commerce management sector, including further extending
Citical thinking to assess the overall plausibility of claim : Assume that the original qualifier was certainly; indicate whether the qualifier changes as we move from a simple, static, uncontested argument.
How the dnc could have been prevented : Social engineering is the term utilize for a large scale of malicious activities achieved through human interactions [1]. It is the art of manipulating people.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify the critical requirements of the audit

Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.

  Write paper on android fragmentation-burden or benefit

Write paper on Android Fragmentation: Burden or Benefit

  Adding value factors to evaluate a decision to add new

adding value factors to evaluate a decision to add new technologywhat types of factors must be evaluated in order for a

  Ehr implementation at community medical center

This is your first day on the job as Assistant Director in the HIM department at Community Medical Center (CMC). You meet with the HIM Director.

  Create a tablet application that can save graded assignment

Assignment: Grades Application. Create a tablet application that can save your graded assignment scores to a local SQLite database. The database should save the following information: Assignment name

  Discuss how any breach of investigation duty disrupts

Take an example of any company to discuss the various consequences of breach of investigation duty.

  A commercial data repository to existing businesses

Use a publisher program to create a one-page, two-fold brochure. If you are using a word processing program, you may create a ne-page, two column document to create your brochure. Address the following in your brochure: You are advertising your se..

  Human resource information systems

Review the human resource information systems (HRIS) along with other HR web pages in the intranet section for Kudler Fine Foods in the Virtual Organizations

  Biggest hesitations to e-business

One of the biggest hesitations to E-business is the potential security threats. As an IT-manager what steps would you take to ensure your businesses online system was safe for customers to use

  Discuss at least 3 different phone-based solutions

Discuss at least 3 different phone-based solutions that can be used in a call center for a help desk.

  Operational aspects of l''oreal corporation

your impressions of the operational aspects of L'oreal Corporation and Identify opportunities for innovation or improvement. Explain.

  What are the frameworks of information security management

ITM 517- What are the frameworks of information security management? Their pros and cons? What are the major perspectives to consider in information security management and framework choice?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd