Security Awareness Training Aid to Overcome Social Engineering Cracks
1 page
English

Security Awareness Training Aid to Overcome Social Engineering Cracks

-

Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres
1 page
English
Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres

Description

Security Awareness Training Aid to Overcome Social Engineering Cracks The term cracking forum is actually used to describe a approach of attack, where a person makes use of persuasion, often mistreating the trust of naivety

Informations

Publié par
Publié le 13 mai 2015
Nombre de lectures 0
Langue English

Extrait

Security Awareness Training Aid to
Overcome Social Engineering Cracks
The term cracking forum is actually used to describe a approach of attack, where a
person makes use of persuasion, often mistreating the trust of naivety or Person to
obtain information that can be used to gain unauthorized gain access to to
computers or information.

Exactly what examples can always be cited on this method of attack?
The first couple of examples show cases where they used e-mail.

The last example shows a panic attack carried out by telephone.

Example 1: You receive an e-mail where the particular sender and the manager or
even someone on account of the support department of your bank.
In the message he admits that that the Internet Banking service is presenting a
challenge and that this issue will be corrected if you run the software attached to
this message.
Your implementation of this application presents a screen similar the one particular
you use to access bank account, waiting for you to type your password. In fact, this
application is prepared to steal your password to access the financial institution
account and sends it to the attacker.

Illustration 2: You receive an electronic-mail saying that will your computer is
infected by a computer virus. The message suggests that you install a application
available on an Internet site, to eliminate the virus through your computer.
The real function of this tool and does not eliminate a virus, nevertheless I give
someone access to your computer and all data stored on it.

Example 3: a stranger cell phone calls your house and says it is the tech support
team of your ISP.
In this connection he states that his relationship to the Internet is presenting a
challenge and then, ask your password to fix it. If you give your password, this
sonamed technical can perform multitude of malicious activities, utilizing your
access account
Internet and therefore such routines relating to its name.
These cases show attacks to social engineering forum, because the speeches and
toasts presented in the examples they try to persuade the Consumer to perform a
task and the success of the attack will depend on solely on deciding of the User to
provide sensitive details or execute programs

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents