Social Engineering Attacks and Counterintelligence

1287 Words3 Pages

Introduction With the technological advances that seem to be advancing daily, our national security has been impacted by the growing popularity of social engineering attacks and counterintelligence. The website WikiLeaks majorly impacted the US with the release of the Afghan War Diary in July of 2010. If that was not bad enough, there was another major release of documents entitled the Iraq War Logs that was posted on the WikiLeaks website in October of 2010. So social engineering attacks and counterintelligence of this type has cause major changes to take place in regards to how classified information is handled. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs The term social engineering refers to intrusion that is non-technical but a result of human interaction. The attacker uses trickery to gain the confidence of an authorized user tricking them into giving up information that the attacker can use to gain access to systems and compromise normal security procedures. Most of the time authorized system users are unaware of the fact they have access to important information, and the attackers prey on these type of users who they know can be careless about protecting it. The greatest threat to security systems today are a result of social engineering. (Rouse, 2006) Merriam-Webster (Webster, 2014) defines Counterintelligence as: “Organized activity of an intelligence service designed to block an enemy's sources of information, to deceive the enemy, to prevent sabotage, and to gather political and military information”. Agencies can use many different types of techniques to help keep information safe.... ... middle of paper ... ...ed on how to respond to information security breaches. Regardless of an organization size, there is always the risk of information breaches. Works Cited Counterintelligence (2014), In Merriam-Webster.com. Retrieved February 1, 2014, from http://www.merriam-webster.com/dictionary/counterintelligence Rouse, M. (2006), Social Engineering, Retrieved on 02/1/2014 from http://searchsecurity.techtarget.com/definition/social-engineering Goldman, Russell & Martinez, Luis (2010), “WikiLeaks: At Least 109,000 Killed During Iraq War”, Retrieved on 02/1/2014 from http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq-war/story?id=11949670#.TyicXlXrOQo Dunn, M. (2013), WikiLeaks: who is(n’t) safe?, Retrieved on 02/1/2014 from, http://www.deloitte.com/view/en_LB/ly/insights-ideas/the-middle-east-point-of-view-magazine%20/1cd7e6b7c8e57310VgnVCM2000001b56f00aRCRD.htm

Open Document