Describe about user security issues and social engineering, JAVA Programming

Describe about User Security Issues and Social Engineering ?

Contrary to popular belief most computer break-ins through external hackers don't happen since of great knowledge of operating system internals and network protocols. They happen since a hacker went digging through a company's garbage and found a piece of paper with a password written on it, or perhaps because they talked to a low-level bureaucrat on the phone, convinced this person they were from the local data processing department and that they needed him or her to change their password to "DEBUG."

This is sort of attack is known as social engineering. Java applets introduce a new path for social engineering. For instance imagine an applet that pops up a dialog box that says, "You have lost your connection to the network. Please enter your username and password to reconnect." How several people would blindly enter their username and password without thinking? Now what if the box didn't really come from a lost network connection but from a hacker's applet? And instead of reconnecting to the network (a connection in which was never lost in the first place) the username and password was sent over the Internet to the cracker? See the problem?


Posted Date: 5/16/2013 7:05:15 AM | Location : United States

Related Discussions:- Describe about user security issues and social engineering, Assignment Help, Ask Question on Describe about user security issues and social engineering, Get Answer, Expert's Help, Describe about user security issues and social engineering Discussions

Write discussion on Describe about user security issues and social engineering
Your posts are moderated
Related Questions
State the Java Programmer Efficiency Faster Development Building an application in Java takes about 50% less time than in C or C++. So, faster time to market Java is said to

Describe even higer dimensions in java? You don't have to stop along with two dimensional arrays. Java allows arrays of three, four or more dimensions. Therefore chances are pr

Define network organization? What are important features of network organization? Network Organization : Network organization is an inter firm organization in which is charac

Normal 0 false false false EN-US X-NONE X-NONE

The flow control statements give you to conditionally execute statements, to repeatedly operate a block of statements, or to just modify the sequential flow of control.

Explain Code and Document Bases ? If you don't know the exact URL of the image, but you do know its name and in which it's in the similar directory as the applet, you can use

What are three ways in which a thread can enter the waiting state ?