book

Social Engineering Attacks

21 Pages 753 Words 1557 Views

According to, “Social Engineering: Hacking the Wetware!” by Applegate Scott, “Social engineering is a methodology that allows an attacker to bypass technical control by attacking the human element in an organization.” The article also states that social engineering is very effective, because attackers target weak individual and organizations to gain access (Scott). “Hacking Techniques (sidebar)." Attacker has different ways to break in to computers, and gain access without the owner knowing their device is compromised or used (Hacking Techniques (sidebar). Hackers use different methods to gain an authorized access, damage computer system, or steal sensitive information from individual’s computer such methods includes Trojan horse, virus, Impersonation, shoulder surfing, and dumpster diving. Hacking a computer is not something new however, it has been around since 1960. Group of hackers started to experiment with computer that is located college campuses (computer hackers). However, those hackers’ motivation was to improve the computer system, and did not have any attention to steal information or damage any devices. In 1970, hackers become to use their skills in a malicious and criminal ways and in 1980 they created groups where they shared their hacking techniques (Computer Hacking). Hacking is not only based on stealing or breaking into companies or individuals’ system, but it also has become a way where rival countries carry cyber-war against each other. “In April 2001, for instance a U.S. surveillance aircraft collided with a Chinese fighter jet near China’s Southern coast, causing tensions to flare between the two countries.” According to “Social Engineering: Hacking the Wetware”! By Applegate Scott Phishing and Trojan email are two common social engineering attacks. These two techniques are required victims to open email attachment, and can be used to compromise the security of the system and privacy (Sc

Read Full Essay