Exploited in social engineering attacks

Assignment Help Basic Computer Science
Reference no: EM133973595

Question

Trust is the main factor that is being exploited in social engineering attacks. Although internet users are becoming more suspicious of emails coming from unknown parties, attackers are constantly searching new ways to spread their malware using existing trust mechanisms. For example, internet users are often encouraged to visit only legitimate Web sites to reduce the risk of malware infections, but distinguishing between legitimate and illegitimate Web sites increasingly appears to be meaningless. According to a recent report by WebSense, seventy percent of the top 100 Web sites either hosted malicious content or contained a link designed to redirect site visitors to a malicious Web site. One of the reasons the web is so popular is that legitimate websites can attract large numbers of visitors, all of whom are a potential victim. Also, social networking websites, such as Facebook and Twitter, have increasingly become popular with hackers. Typically, hackers steal members' usernames and passwords and then bombard the victims' friends and family with thinly disguised marketing messages, directing them to third-party web pages containing malware. Computer users who would normally be suspicious of similar emails arriving in their regular inbox may be more susceptible when they are communicated via Facebook from a contact they believe to be a friend. While reports of extortion and false impersonation have been common in phony phone calls and fake e-mails, similar fraud hasn't been reported on Facebook until recently. Now a number of complaints are surfacing. For example, Bryan Rutberg's Facebook status update -- the way friends track each other -- suddenly changed on January 21 to this frightening alert: Bryan NEEDS HELP URGENTLY His online friends saw the message and came to his aid. Some posted concerned messages on his public profile -- "What's happening ? What do you need?" one wrote. Another friend, Beny Rubinstein, got a direct message saying Rutberg had been robbed at gunpoint in London and needed money to get back to the United States. So, trying to be a good friend, Rubinstein wired $1,143 to London. All these things happened while Bryan was at his home in Seattle.

(i) How can we defend against attacks that take advantage of these existing trust mechanisms?

(ii) How do you stay safe on social networking sites? Where does the best countermeasure lie against these scams: technology, education, or policy?

(iii) What kind of measures do social networking sites take to prevent impersonations?

Reference no: EM133973595

Questions Cloud

Concept of number consist in mental development : Describe how the concept of number was introduced to children based on measurement. How did learning the concept of number consist in mental development?
What are the functions of cultural tools : What are the functions (purposes) of cultural tools? What is the difference between lower and higher psychological functions?
Discuss the art and method of Influence and Manipulation : Discuss the art and method of Influence and Manipulation. How are each applied to a social engineering plan?
Explain category-specific deficits in living things : Describe a theory to explain category-specific deficits in living things (compared to nonliving things).
Exploited in social engineering attacks : Trust is the main factor that is being exploited in social engineering attacks. Although internet users are becoming more suspicious of emails
What was the interest expense at the effective interest rate : What was the interest expense at the effective interest rate on the December 31 annual income statement?
Calculate the amount of gain on the sale of the land : Calculate the amount of gain on the sale of the land that should be recognized in the consolidated financial statements in 2021.
How do you feel about marriage counseling in prison : How do you feel about marriage counseling in prison? What ethical codes should a therapist need to keep in mind if participating in this?
Calculate beneishs m-score for detect earnings manipulation : Before taking the quiz, calculate Beneish's M-Score for detecting earnings manipulation for twelve years (2013-2024) using thirteen years of data (2012-2024).

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd