How Hackers Can Be Stopped Research Paper

PAGES
2
WORDS
632
Cite

“Pulling Strings” in Internal Auditor Magazine The article by Russell Jackson (2018) entitled “Pulling Strings: High-level hackers are using social engineering tactics to manipulate employees into giving up vital information,” the subject of hackers using deceptive practices to trick employees into giving up company data is discussed. Jackson (2018) describes how hackers have now realized that it is easier to use deception and fool workers into granting access to organizational data than to actually try to hack their way into an organization’s system and steel information. As Jackson (2018) points out, “well-intentioned employees will offer account numbers, volunteer passwords, and even open locked security doors if the request seems reasonable or the threat seems real?—?or if the stranger seeking physical access is a decent actor with an adequate disguise.” Workers fall for four basic social engineering ruses—(a) content in a strange email that looks inviting, (b) provocative social media messages that they just have to respond to, (c) fake package deliveries, and (d) exciting offers made over the telephone. Jackson (2018) states that auditors have to know what the trends in social engineering are so that they can help...

...

The victim gives up all security by clicking on suspicious links in an email or text messaging and clicking a button on a website they’ve been directed to. The main method used by the hacker is persuasion: the hacker convinces the employee that it is in the best interest of the organization to follow the directions. Oftentimes, employees are undone simply by curiosity: they do not exercise the critical thinking skills needed to assess the threat level of a strange email, text or phone call. Employees have to be advised by organizations to be on the lookout for such communications and the organization has to develop a protocol to follow for every communication received.
Social engineering training can help organizations and their employees to be better prepared to handle any of the above described tactics. The goal is for employees to be mindful of the different ways that hackers could be out to dupe them. Getting into the practice of always asking for ID even if it might seem rude is the best approach. To get over the fear of possibly offending someone, social engineering training is designed to educate workers on…

Cite this Document:

"How Hackers Can Be Stopped" (2018, September 20) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/how-hackers-can-be-stopped-research-paper-2172813

"How Hackers Can Be Stopped" 20 September 2018. Web.19 April. 2024. <
https://www.paperdue.com/essay/how-hackers-can-be-stopped-research-paper-2172813>

"How Hackers Can Be Stopped", 20 September 2018, Accessed.19 April. 2024,
https://www.paperdue.com/essay/how-hackers-can-be-stopped-research-paper-2172813

Related Documents

SOPA Stop Online Piracy Act Dear Congressman Owens (NY), The Internet was created by the United States of America's military in order to better communicate information between computers long distances apart without requiring physical connections; thereby creating a free and open space between the computers networked. This moment was the beginning of file sharing as it exists and is contested today. The Internet has clearly changed the way the entire world absorbs and

The Anti-Counterfeit Trade Agreement (ACTA), in particular, was pushed through the international legislative process with insufficient public input and opportunity to study and respond (Jolly, 2012). As a result, seventy-five law professors have signed an open letter to U.S. President Barack Obama urging him to reconsider U.S. ratification; they have also suggested that there may be serious constitutional problems with his signing the treaty in its current form on behalf

Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a

Released by the FBI and
PAGES 65 WORDS 17274

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

They would sometimes be using the school curriculum as an excuse to hack pertinent information that are government or privately owned. At some point, these students would be challenging themselves if they will be able to create and send unnecessary information (such as computer viruses) to other computer systems. This will provide extreme joy and satisfaction for these students. However, the issue here lies on how can this be

All of these tools make it possible for a hacker to not only corrupt the application itself in terms of accessing confidential information, but further allow for the hacker to spread damage deep into the application to attack other systems, essentially able to shut down an entire application with the corruption of contained information. Though some of the aforementioned tactics involve the physical infiltration of a company in order to