Tuesday, December 17, 2019

Social Engineering Is A Powerful Tool Used By Cyber Criminals

Social Engineering It is the manipulation of people through deception, lies, fabricated story and tricks. They influence and persuade people to obtain information with or without the use of technology. Social engineering is a powerful tool used by cyber criminals’ especially on seniors because of their level of trust. They aim at collecting your confidential information and later use it against you. Password, Account number – credit card, debit cards, employee ID, and full name, date of birth, email address, social insurance number, driver license number and telephone numbers are normally collected Knowing the person you are dealing with, and the tactics they use is important to overcome them, that is why user awareness and education is†¦show more content†¦Protection against Social Engineering †¢ Never give confidential information through emails, phones or to unknown person †¢ Don’t click on a website unknown to you or download or open email attachment from unknown senders. †¢ Before clicking on links in emails and on websites watch for misspellings, @ signs and suspicious domain names. †¢ Make it a habit to periodically check your bank statement to see if they are anomalies or fraudulent transactions. †¢ Use a strong password and personal verification questions. †¢ Reject requests for online tech support from strangers no matter how legitimate they may appear †¢ Avoid being greedy on the web for offers you have not made or responding to any offers made over the phone or via text messages. †¢ Pay attention to website URL. Sometimes online fraudsters make slight changes to URLs in order to direct messages to their own spoofed sites †¢ Secure your computer with anti-virus software and regularly update software and operating systems †¢ Verify that a lock icon is on your browser address bar when submitting payment or confidential information. †¢ Always shred and/or destroy prior to disposal sensitive and confidential information you do not need. †¢ Be suspicious of unsolicited emails †¢ Be cautious in situations where a party refuses to provide basic contact information †¢ Verify incoming checks and ensure clearance prior to transferring any money by wire †¢ Establish call-back procedures to clients and vendorsShow MoreRelatedSocial Engineering Is A Powerful Tool Used By Cyber Criminals1767 Words   |  8 Pagesinfluence and persuade people to obtain information with or without the use of technology. Social engineering is a powerful tool used by cyber criminals’ especially on seniors because of their level of trust. They aim at collecting your confidential information and later use it against you. Password, Account number – credit card, debit cards, employee ID, and full name, date of birth, email address, social insurance number, driver license number and telephone numbers are normally collected KnowingRead MoreComputer Security And Social Engineering3915 Words   |  16 PagesComputer Security and Social Engineering In terms of computer security, Social Engineering refers to the psychological manipulation of people in order to access confidential information. It is believed that it can be easier to trick people than to hack into their computing system by force. Social engineers gather personal information or gain access to computers by exploiting people’s natural tendency to want to trust others and be helpful. Some methods that are used by social engineers to gain informationRead MoreA Thesis On Computer Science Engineering9162 Words   |  37 PagesBOTNET FRAMEWORK A Thesis Submitted In Partial Fulfillment of the Requirements For the Degree Of MASTER OF TECHNOLOGY In Computer Science Engineering By CHANCHAL AHLAWAT (Enrollment no: 21341314013) Under the Supervision of Mr. ANCHIT BIJALWAN Uttaranchal University, Dehradun, Uttarakhand) To the Faculty of Computer Science Engineering UTTARANCHAL UNIVERSITY DEHRADUN May, 2015 CERTIFICATE Certified that Chanachal Ahlawat (21341314001), has carried out the research work presentedRead MoreThe Growing Problem of White Collar Crimes in India19963 Words   |  80 Pages people will lose faith in us†- Dr Radhakrishnan Methodology The research methodology used for the present research article is traditional Doctrinal research method. As most of the information can be sought form the available literature. So the researcher has chosen doctrinal method as method of research for the present article and has used books, journals, research articles for preparation of the same. Objectives of the study The main objectives of the researchRead MoreSocial Media6807 Words   |  28 PagesSocial Networks and their impact on Availability, Confidentiality and Integrity Musa Ramadhani Davenport University IAAS 667 - Legal and Ethical Security Topics Deanne Cranford-Wesley Table of Contents Abstract3 Introduction4 Problem Statement7 Literature Review8 Findings11 Military Families12 Identifying your social media users16 Common myths about Social Media17 Data leakage and non-disclosure17 Social Media Squatting18 A new generation of hackers18 The high cost of inaction19 Read MoreSocial Media And Its Effects On The Internet2870 Words   |  12 PagesAbstract Social networking websites are the most prominent websites on the Internet. Millions of people use them every day to interact and connect with family, friends, and loves who maybe far away or within big businesses organizations, and schools. Social networking websites like Twitter, Facebook, LinkedIn and Google Plus and Google Handouts seem to be the most popular websites on the Internet. Social networking privacy issues have ruled the headlines in the first half of 2011. With most social networksRead MoreCore Banking Solutions12901 Words   |  52 PagesOf Core Banking Solutions (CBS) Objectives of the Project Work: The major objectives of this project work are to: †¢ To evaluate the advantages and disadvantages of CBS over traditional banking system †¢ To explore the technology used in CBS with special reference to Shreyas Grameen Bank. †¢ To identify and discuss various issues related with the automization of Banks. †¢ To define various Core Banking Services provided by Indian Banks. †¢ To identify andRead MoreFactors Influencing Enhanced Data Security Essay9883 Words   |  40 Pagesgovernment body which regulates all operations of commercial banks, controls the monetary policies as well as revoking banking licenses. Cyber-crime- this refers to all attempts by hackers to access information, manipulate and transfer unauthorized data or information. Data breach- This is any access of information by unauthorized people ICT Department- this shall be used to describe the department within the corporate which deals with handling of data and managing MIS. Hacker- this is a person who knowinglyRead MoreA Study of How to Promote the Use of Mobile Payment4519 Words   |  19 Pages209KM Research Methods Project Proposal A study of how to promote the use of mobile payment This example is for discussion, not used as a model of good report Table of Contents 1 Title 1 2 Aim 1 3 Objectives 1 4 Background 2 5 Critical review of relevant literature 3 5.1. Basic Mobile Payment Types 3 5.1.1. Mobile Fees Account Payment 3 5.1.2. Bank Card Mobile Payment 3 5.1.3. Token based Mobile Payment 4 5.2. Mobile payment choice 5 5.3. Factors that influenceRead MoreThe Pros and Cons of Cloud Computing3785 Words   |  16 Pages(IS) to the client by slipping into the role of a CIO on the receiving side and a sales person on the giving side respectively. â€Å"Cloud† is more a term than a definition, much like â€Å"web 2.0†, which describes a conglomerate of modern, dynamic and social web services. CC refers to a concept where the user gets computing and storage capacity without owning it, everything happens beyond his senses, in the â€Å"cloud†. The concept dates back to the 60s where the ideas of global computing networks shed the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.