Sunday, 28 September 2014

Social Engineering

 Social Engineering

Social engineering is a technique used to deceive people to break security standards at companies they work for. Social engineers try to gain the confidence of people there are trying to attack. They attack personal at a company who has authorized access to certain information and this all compromises the company’s security as well as their network vulnerability. Social engineers master the art of convincing people and how to read their minds and use this to their advantage.

How are organizations at risk from social engineering?

The general populations of workers don’t understand how crucial it is to keep their passwords and user names save from anyone. Some of them share information to people they just met in order to be friendly or because they are so used to helping people and it’s in their nature to do so.
A study that has been conducted has shown that many employees leave their usernames and passwords on sticky notes on their work tables which can be easily copied or stolen.
Works accounts can be hacked in from anywhere from any access point and they might notice the impact of what the hackers have done slowly or immediately in the following months.
Employees should realize that even the garbage they throw away might contain important information that may be just what certain people are after for.
Social engineers may even use the details that they have accumulated and pretend to be you on a certain number of websites which is a form of identity theft.

How are hackers able to pull off their tricks?

One of the predominant tricks or scams they carryout are the way in which they pretend to be an employee or user of the system. Acting as an important user a hacker can gain vital access by posing as a higher-lever manager that may need the use of certain computers and documents. This is where normal employees get tricks in believing that the “hire-level” manager is for real and don’t ask questions.
Another way of getting information from people is phishing which involves sending a large amount of emails that may seem legit and this trapes people into surrendering information . These emails may lead a user to respond back to the email or is directed to a website where they are asked to enter in personal information, such as back account , id , credit card number and many more personal information.
Vishing is a technique used where social engineers call the victim to get personal information.
The hacker usually hack certain institutions to get a list of people they need to phone.
These calls may seem legit as if they are from your bank and are usually prerecorded messages that tell the user to dial another number where the hackers request personal information.


One way of solving this problem is establishing frameworks and employee level and they should be trained on the various levels of how these people will do anything to get what they need in order to access certain files and documents. Employees should be able to identify what information is important to keep save and protected and what type of questions that are being asked may sound suspicious.

No comments:

Post a Comment