Review problem related to social engineering attacks

Assignment Help Management Information Sys
Reference no: EM132218775

Question: Social Engineering Attacks are the most common form of cyber-attacks as it mainly deals with manipulating users over online by sending different text messages, links and files over the Internet. The hacker will wait for the user to make a mistake by clicking them and gains access, steals the data accordingly (Conklin, White, Williams, Davis, & Cothren, 2010). One of the examples of Social Engineering victim is the Ubiquiti Networks Company related to computer networking Industry operates from the United States. In the year 2015, the company had lost about $46.7 million due to the phishing attack by the hackers who mainly targeted the employees, managers by impersonating them and making fake messages and requests through emails (Hackett, 2015). The phishing worked well for the hackers and they were able to transfer the money into their accounts by gaining the access whenever the manager or employees access the fake messages. It made a huge impact on the company as they were only able to recover only $8.1 million.

There are certain measures that could have prevented the Ubiquiti networks company against such social engineering attacks. The first measure would be the implementation of two-factor authentication for each system that is utilized by the employees. The phone-based verification is very popular using OTP's and it should be linked with every system that helps in restricting majority of the attacks. Goyal et al. suggested to adopt the hash functions and random number generating techniques at sender and receiver for secured connection while dealing with both the mobile and desktop systems (Goyal, Vakil, Parmar, Jain, & Jinwala, 2015). Software's for spam filters and firewalls will be appropriate to restrict such attacks further.

References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2010). Principles of Computer Security; Second Edition. New York: Tata McGraw-Hill Education.

Goyal, T., Vakil, A., Parmar, D., Jain, R., & Jinwala, D. C. (2015). Preventing Phishing Attacks: A Novel Approach. International Journal of Computer Applications, Vol. 121, No. 14, 8-12.

Hackett, R. (2015, August 10). Fraudsters duped this company into handing over $40 million. Retrieved from fortune.com.

Reference no: EM132218775

Questions Cloud

What can teresa do to resolve the problem : What can Teresa do to resolve the problem? What learning and perception factors should she consider as she analyzes the situation?
Explain reasons for decline of union density in Australia : Explain the reasons for the decline of union density in Australia over the last 20 years or so and the consequences of this decline
What factors influence the way we perceive people : What factors influence the way we perceive people? How might these factors influence the judgments an interviewer makes about a job applicant?
Discussion-implementing erm in higher education environment : Chapter 6 presented the approach the LEGO Group used to implement ERM, and chapter 9 presented a discussion and case study on implementing ERM in a higher.
Review problem related to social engineering attacks : Social Engineering Attacks are the most common form of cyber-attacks as it mainly deals with manipulating users over online by sending different text messages.
Briefly compare and contrast the two committees : Briefly compare and contrast the two committees. Identify what each committee is working on currently. Identify if author has a bias and explain with examples
Discuss implementation issues in the e- commerce management : CIS8100 E-commerce Implementation Report & Prototype Website - discuss implementation issues in the e- commerce management sector, including further extending
Citical thinking to assess the overall plausibility of claim : Assume that the original qualifier was certainly; indicate whether the qualifier changes as we move from a simple, static, uncontested argument.
How the dnc could have been prevented : Social engineering is the term utilize for a large scale of malicious activities achieved through human interactions [1]. It is the art of manipulating people.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd