Exploiting security weaknesses social engineering

Assignment Help Management Theories
Reference no: EM131052985

Exploiting Security Weaknesses Social Engineering

An employee who needs permission to access an electronic workspace, database, or other information systems resource typically fills in a request form and obtains approval from the responsible manager. The manager then routes the request to one of the system's administrators. Highly trusted and well-trained systems administrators spend a significant amount of time doing nothing more technical than adding or removing names from access control lists. In large organizations, it's not unusual for systems administrators to have never met any of the people involved in a specific request. The administrators may not even work in the same office. Hackers have learned to take advantage of this approach to access authorization. They begin by probing an organization. The hacker doesn't expect to compromise the system during this initial probe. He or she just starts by making a few phone calls to learn who is responsible for granting access and how to apply. A little more probing helps the hacker learn who's who within the organization's structure. Some organizations even post this information online in the form of employee directories. With this information in hand, the hacker knows whom to talk to, what to ask for, and what names to use to sound convincing. The hacker is now ready to try to impersonate an employee and trick a systems administrator into revealing a password and unwittingly granting unauthorized access. Organizations determine who needs access to which applications. They also need a system through which they can authenticate the identity of an individual making a request. Finally, they need to manage this process both effectively and inexpensively.

a. Describe the business problems that this exercise presents.

b. Suggest several ways to reduce an organization's exposure to social engineering.

c. Prepare an orientation memo to new hires in your IT department describing "social engineering." Suggest several ways employees can avoid being tricked by hackers.

Reference no: EM131052985

Questions Cloud

Joint and several liability : Joint and several liability is when multiple parties can be held liable for the same event or act and be responsible for all restitution required. In cases of joint and several liability, a person who was harmed or wronged by several parties could..
What is the current value of this investment : An investment offers $18,000 per year for 10 years. If the investor can earn 6 percent annually on other investments, what is the current value of this investment?
How much is your options investment worth : Suppose you buy 10 contracts of the February 110 call option. How much will you pay, ignoring commissions. In part a, suppose that Macro soft stock is selling for $130 per share on the expiration date. How much is your options investment worth? What ..
Formulating a theory of reality : How would you start a short 250 word essay in regards to formulating a theory of reality. Describe. How does your theory contribute to a meaningful life for you?
Exploiting security weaknesses social engineering : An employee who needs permission to access an electronic workspace, database, or other information systems resource typically fills in a request form and obtains approval from the responsible manager. The manager then routes the request to one of ..
What expectations are presented in the policy : Explain the company's capacity to be able to fulfill strategic missions while increasing profit margin
Determine the initial price of a rare comic book : Some collectors view comics as an investment. The effective rate of interest, r, earned by an investment can be defined by the formula, Determine the initial price of a rare comic book that resold for $1139 after two years, earning its owner 18% int..
Approach crafting a research project : This week, through our work, we have looked ahead at how we should approach crafting a research project and the steps we should take to prepare the best project we can in the time we have available to us. Additionally, we have begun to explore the..
Payments are made at the beginning of each year : A saver wants $180,000 after 10 years and believes that it is possible to earn an annual rate of 10 percent on invested funds. What amount must be invested each year if the payments are made at the BEGINNING of each year?

Reviews

Write a Review

Management Theories Questions & Answers

  What is the break-even point in dollars

Marty McDonald has a business packaging software in Wisconsin. His annual fixed cost is $ 10.000, direct labor is $3.50 per package, and material is $450 per package. The selling price will be $12.50 per package. what is the break-even point in dolla..

  Quality and performance improvement analysis paper

Write an analysis of (750-1,000 words) on quality and performance improvement in health care. Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required

  Unliquidated damages in an original pleading

Does an attorney's pleading of a dollar amount for unliquidated damages in an original pleading which sets forth a claim for relief constitute an ethical violation?

  Advantages and disadvantages of share capital

Advantages and disadvantages of share capital

  Users to run a bunch of operating systems

Virtualization's big push to fame was arguably kick started by VMware's Workstation product, which allowed individual users to run a bunch of operating systems (OS), versions, or instances (similar to multiple application windows) instead of havin..

  The statement of cash flows

The statement of cash flows, in the US, is divided into three required categories: operating, investing, and financing activities.

  How has hhsa engaged citizens in its initiatives

How has HHSA engaged citizens in its initiatives? How has this process benefited the county strategically

  Consumers of the energy drinks

Can the Australian consumers of the energy drinks you considered in question 1 bring any Australian Consumer Law (ACL) cause of action under Part 3-5 against the manufacturers of those drinks?

  Sources a better source of new product ideas

Is the company's sales force or external sources a better source of new product ideas? Research an example of either or both approaches. Please address the ramifications of the globalization of the company's product line in your discussion. Explain y..

  Wide range of experience for that next job opportunity

Do you agree that the trend now is to become less of a generic project manager and more of a specialist? If so, then how do you gain a wide range of experience for that next job opportunity?

  Business process management

In this writing assignment, you will explore how organizations use business process management (BPM). Write a onepage (250-word) paper explaining how organizations use business process management (BPM). Be sure to use at least one specific example..

  Describe the system of legal responsibilities among share

Describe the system of legal responsibilities among shareholders

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd