Discuss about the social engineering attack

Assignment Help Management Information Sys
Reference no: EM132000054

1Q) Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented.

need a response 250 words.

2Q) Social Engineering is a term used to manipulate or attack people to gather confidential information through non-technical means. Reverse Social Engineering is a special form of Social Engineering here the attackers initially use social engineering to make the victims believe that they are from genuine source or organization , so the victims themselves approach and provide more information to attackers unknowingly.

The article discusses about the Social engineering attack made on Ubiquiti Networks. Ubiquiti Networks is a San Jose based networking company.

It fell prey to an Email fraud and had lost around $39 million dollars. One of the staff members from its subsidiary company based out of Hong Kong became a victim to the Business email attack also referred to as CEO scam. The organization's finance wing was targeted by impersonating and making fraudulent request to an employee from an external entity.

And this resulted in transfer of an amount of 46 million dollars from Hong Kong based subsidiary company to the external third party. Upon becoming aware of the attack, Ubiquiti Networks was able to recover 8 million dollars. Below are few of the measures that could have been taken to prevent it.

(a) The Company's website domain have to be established and all the email accounts need to refer to the company's domain instead of other web based emails.

(b) The hierarchical information related to the company should never be posted on the Company's website or any other job posting forums.

(c) Additional security features need to be established for financial departments and email communications through personal or non-company based email should not be encouraged and restrictions need to be imposed on them.

(d) Digital signatures need to be established for transactions.

(e) Spam emails should never be opened and they have to be deleted immediately.

Reference no: EM132000054

Questions Cloud

Fully depreciated-obsolete and has no salvage value : St. Johns River Shipyards's welding machine is 15 years old, fully depreciated, obsolete, and has no salvage value.
Opportunity cost of going to the show : She can take work at that pay rate whenever she wants. What is Shonda's opportunity cost of going to the show?
Reinvestment means : "Reinvestment" means. What is the firm's after tax cost of debt?
Economy has entered into a recession : Suppose that the economy has entered into a recession, and you are asked to determine whether it has been caused by a demand shock or a supply shock.
Discuss about the social engineering attack : The article discusses about the Social engineering attack made on Ubiquiti Networks. Ubiquiti Networks is a San Jose based networking company.
Which modern inventions does ray bradbury predict : Which modern inventions (such as big-screen televisions, the Bluetooth device, and online role-playing games) does Ray Bradbury predict in his novel Fahrenheit.
Develop lesson plans that meet the needs of learners : How can you use the assessment information to develop lesson plans that meet the needs of learners?
Qualitative dimensions of farming systems : What can be done to improve the qualitative dimensions of farming systems and not just increase yields and total production?
Manufactures time series photographic equipment : Photochronograph Corporation (PC) manufactures time series photographic equipment.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd