.

Monday, April 22, 2019

Social Engineering Attacks and Counterintelligence Essay

Social Engineering Attacks and Counter science - Essay ExampleThis essay looks at the concept from the certification viewpoint. Social Engineering is defined as the process of deceiving people into giving outdoor(a) access or confidential information (Social Engineering Defined). Hackers, identity thieves, information brokers, disgruntled employees etc. atomic number 18 examples of tender engineers. Dr. Max Kilger, co-author of theHoneynet Project identifies the motivators for non-ethical computer activity which potty also be use to social engineering these are money, entertainment, ego, cause, entrance into a social group and status within that social group (Typical Goals of a Social Engineer). Counter Intelligence To a layman, counterintelligence would mean the opposite of intelligence seen from the security angle. Counterintelligence (CI) can be defined as information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, othe r intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or inter field terrorist organizations or activities (Office Of Counterintelligence, 2011). Implications to discipline Security New age threats of different kinds according to Car and Musladin (2013) pose a challenge to national security. These are explained below. A few such challenges like terrorism, organized crime, and activism with a negative face are considered here. Terrorism is one of the dreaded scourges that affect national security. As Car and Musladin explain, terrorists actively use the net income to network and carry out physical attacks on nations, who even own up to terror acts on the internet. Organized Crime cannot be far behind. The use of the internet ensures that people at the higher echelons of a terror network go unapprehended and remain free to plan get ahead terror strikes. All sorts of histrion take place by che ating unsuspecting victims. The defrauding of banks and other financial institutions can lead to the destabilization of the economy. According to Car and Musladin, activism with a negative face also finds voice on the internet. This can counterfeit and build public opinion. Unfortunately, it can provoke the masses as they can be manipulated by sorrowful raw nerves. On the other end of the spectrum, the internet is also the stage of revolutions and protests. The Arab Spring is an instance of a revolution that took the help of digital media. When mainstream media is muffled or does not offer any succor, it is such media which establish the voice of the public and leads to revolutions. Importance of Sound Information Workforce It is of utmost importance that a cloggy information manpower is maintained. The workforce should be aware of and alert about their work environment at all times. They should be sensitized to the value of the data being handled by them. Only an aware workfo rce can secure its data. Social engineering also poses a grave threat to security. The key to preventing this would be a transparent communication system at all times. Impersonation and identity thefts can be reduced to a large extent with a structured communication system. At times, the workforce can sense patterns and peculiarities in routine activities. Hence, corrective action can be taken before further damage occurs. Finally, it is always best to strike at the roots. Any fool proof system to be designed for security is best

No comments:

Post a Comment