La lecture à portée de main
Description
Informations
Publié par | tearofelf |
Publié le | 13 mai 2015 |
Nombre de lectures | 0 |
Langue | English |
Extrait
Security Awareness Training Aid to
Overcome Social Engineering Cracks
The term cracking forum is actually used to describe a approach of attack, where a
person makes use of persuasion, often mistreating the trust of naivety or Person to
obtain information that can be used to gain unauthorized gain access to to
computers or information.
Exactly what examples can always be cited on this method of attack?
The first couple of examples show cases where they used e-mail.
The last example shows a panic attack carried out by telephone.
Example 1: You receive an e-mail where the particular sender and the manager or
even someone on account of the support department of your bank.
In the message he admits that that the Internet Banking service is presenting a
challenge and that this issue will be corrected if you run the software attached to
this message.
Your implementation of this application presents a screen similar the one particular
you use to access bank account, waiting for you to type your password. In fact, this
application is prepared to steal your password to access the financial institution
account and sends it to the attacker.
Illustration 2: You receive an electronic-mail saying that will your computer is
infected by a computer virus. The message suggests that you install a application
available on an Internet site, to eliminate the virus through your computer.
The real function of this tool and does not eliminate a virus, nevertheless I give
someone access to your computer and all data stored on it.
Example 3: a stranger cell phone calls your house and says it is the tech support
team of your ISP.
In this connection he states that his relationship to the Internet is presenting a
challenge and then, ask your password to fix it. If you give your password, this
sonamed technical can perform multitude of malicious activities, utilizing your
access account
Internet and therefore such routines relating to its name.
These cases show attacks to social engineering forum, because the speeches and
toasts presented in the examples they try to persuade the Consumer to perform a
task and the success of the attack will depend on solely on deciding of the User to
provide sensitive details or execute programs