Exploiting security weaknesses social engineering

Assignment Help Management Theories
Reference no: EM131052514

Exploiting Security Weaknesses Social Engineering

An employee who needs permission to access an electronic workspace, database, or other information systems resource typically fills in a request form and obtains approval from the responsible manager. The manager then routes the request to one of the system's administrators. Highly trusted and well-trained systems administrators spend a significant amount of time doing nothing more technical than adding or removing names from access control lists. In large organizations, it's not unusual for systems administrators to have never met any of the people involved in a specific request. The administrators may not even work in the same office. Hackers have learned to take advantage of this approach to access authorization. They begin by probing an organization. The hacker doesn't expect to compromise the system during this initial probe. He or she just starts by making a few phone calls to learn who is responsible for granting access and how to apply. A little more probing helps the hacker learn who's who within the organization's structure. Some organizations even post this information online in the form of employee directories. With this information in hand, the hacker knows whom to talk to, what to ask for, and what names to use to sound convincing. The hacker is now ready to try to impersonate an employee and trick a systems administrator into revealing a password and unwittingly granting unauthorized access. Organizations determine who needs access to which applications.

They also need a system through which they can authenticate the identity of an individual making a request. Finally, they need to manage this process both effectively and inexpensively.

a. Describe the business problems that this exercise presents.
b. Suggest several ways to reduce an organization's exposure to social engineering.
c. Prepare an orientation memo to new hires in your IT department describing "social engineering." Suggest several ways employees can avoid being tricked by hackers.

Reference no: EM131052514

Questions Cloud

Write a paper about art tom brenner stoop pastel on paper : Write a paper about art Tom Brenner Stoop Pastel on paper. What era of Art History does your artwork belong to? INTRO: one paragraph
High degree of trust-commitment : I was in an organization that had a high degree of trust, commitment, and effort in stilled into everyone that worked there.  I was in the United States Marine Crops where every Marine is instill with a core set of values to fallow while doing the..
Regarding buy-sell agreements : Which of the following statements is true regarding buy-sell agreements?
Regarding tax implications of key employee life insurance : Which of the following statements regarding the tax implications of key employee life insurance is correct?
Exploiting security weaknesses social engineering : An employee who needs permission to access an electronic workspace, database, or other information systems resource typically fills in a request form and obtains approval from the responsible manager.
Benefit payments have started under pure life annuity : If the annuitant dies after annuity benefit payments have started under a “pure life annuity” settlement option
Explain the distribution channel : Pick a company and construct a diagram to explain the distribution channel that their products go through. Report in APA essay format 1 1/2 to pages long. Can add diagram to it and must cite references.
Company to profile-whole foods inc : How attractive is your company in the field of competitors? How has it entered the market and how is it positioned to capture a share of the emerging markets? Is this even a strategy for your company?
Problems with passwords authentication : Network and application managers need to know who is accessing their systems to determine appropriate access levels. Typically, they require that users create secret passwords. A secret password, known only to the user, allows an administrator to ..

Reviews

Write a Review

Management Theories Questions & Answers

  The impact on employees or the changing role of management

The impact on employees or the changing role of management

  How is the gantt chart related to the smart approach

Practices can benefit from planning tools such as the control loop, says Dr Simon Auty. All of us plan our lives - even if it is only planning to get up at 7am to arrive at work on time. Longer term it could be planning the installation of a new I..

  What similarities do you see among the four management

What similarities do you see among the four management functions of planning, leading, organizing and controlling

  Explain the various leadership styles

1. Explain the various leadership styles and their salient features. Which leadership style is the best? Justify?

  What are benefits and problems of diversity in the work plac

What are benefits and problems of diversity in the work place?

  What other fields are at risk

Organizations are always at risk for ethical dilemmas of some kind. Without revealing names of specific individuals, explain how an organization similar to the one you currently work in, or an organization that you may be aware of, is at risk for ..

  Discussion assignment of marketing management

1. 'Range Brand Strategy' offers one brand name - through a single promise - for a range of products belonging to the same area of competence. Identify at least four brand names from your local market that are in accordance with 'Range Brand Strategy..

  The impact of the affordable care act on the health

Write a paper about The Impact of the Affordable Care Act on the Health Care Workforce

  Business a line of credit and a revolving line

Contact a lending officer at a local bank in your community, or visit the bank's website, to check the bank's policies on providing a business a line of credit and a revolving line of credit.

  Importance of employee feedback

Evaluate the importance of employee feedback from the manager's stand point, as well as, the employee's stand point. Discuss the three approaches managers can take to conducting feedback. In your opinion, what is the approach you would prefer and ..

  A distribution curve of new products on the market

Compile a list of 100 new products. If you are building a portfolio (EXTRA CREDIT at the end of the semester) of ads (see the Application Exercise in Chapter 6), you can generate part of this list as you collect print advertisements for the top..

  Case of implementing self-managed teams

What type of changes a traditional organization would need in its Structure, Training practices and Reward System in case of implementing self-managed teams?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd