Social Engineering

1210 Words3 Pages

We live in one of the best times in world. An era where connection and communication is possible at anytime, anywhere, across the seven seas. It’s a beautiful time to be alive; having the world and all its people at the tips of your fingers is a phenomena that over a century ago would have been called magic. Technology is becoming our way of life and we must protect that digital life the same way we protect our real one. As of lately, internet frauds and social engineering has been sweeping the nation off its feet. It’s almost no challenge to hijack someone’s account when their information is floating around the online network. This paper is about the techniques of Social Engineering, examples of attackers and victims and how social engineering plays a big role in Internet Fraud.
There are many types of frauds out there and the internet is making them easier. People are easily deceived because they forget that behind their computer screen is another human being who may not be who they say they are. Social engineering is a type of masquerade, which means tricking people into providing sensitive information or physical access to resources (Smith). A mind game expert named Brian Brushwood talked about how to get people to do what you want by using four basic sociological and psychological tactics.
• He said the first principle is that ‘Social engineers are confident and in control of the conversation—that to pull off something deceptive is to act confident and be in control of the conversation. Instead of sneaking around, they proactively approach people and draw attention to themselves
• The second principal is Social engineers give something—it’s hard to reject a request made by someone who displayed an act of kindness and people ...

... middle of paper ...

.... .
Hadnagy, Christopher. Social Engineering: The Art of Human Hacking. 2011.
Hanselman, Scott. Chasing an active Social Engineering Fraud at Amazon Kindle. 12 February 2013. 22 April 2014. .
Hiroshima, Naoki. My $50,000 Twitter Username Was Stolen Thanks to PayPal and GoDaddy. 29 January 2014. 22 April 2014. .
Honan, Mat. How Apple and Amazon Security Flaws Led to My Epic Hacking. 8 August 12. 22 April 2014. .
Mitnick, Kevin. The Art of Deception: Controlling the Human Element of Security. 2003.
Smith, Richard. Elementary Information Security . 2011.

Open Document