Verified Document

Phishing As A Social Engineering Attack Essay

Related Topics:

Communication on the Internet

Introduction

The Internet has become so ingrained in our society today that it is impossible to imagine day-to-day life without it. Thiry years ago, this was not the casebut all aspects of life have changed do to this technological advancement. The challenge is that the Internet may create as many problems as it solves. In one sense, for example, it can be seen as a double-edged sword, offering boundless information and connectivity while also serving as a playground for cybercriminals. Understanding online communication and how it works is necessary to grasp how cybercriminals exploit vulnerabilities to their advantage. This paper looks at the mechanisms of Internet communication, focusing on the major networking building blocks and their functions, followed by an exploration of software applications' vulnerabilities, particularly within web browsers.

Networking Building Blocks and Their Functions

The Internet's architecture is built upon several critical components that work in tandem to facilitate seamless communication across the world. These components include Internet Service Providers (ISPs), protocols, routers and switches, domain name systems, and content delivery networks (Sunyaev & Sunyaev, 2020). Each does something different in the processes of the Internet.

ISPs act as the gateway for individuals and organizations to access the Internet (Lone et al., 2020). They provide the necessary infrastructure for digital data transmission over vast distances, connecting users to the global network. Protocols are rules that define how data is transmitted over the Internet. The most fundamental protocols include the Transmission Control Protocol (TCP) and the Internet...

TCP ensures reliable delivery of data by establishing a connection between the sender and receiver, while IP addresses are used to identify devices on the network, ensuring data reaches its correct destination.

Routers and switches are devices that direct data traffic on the Internet. Routers route data packets across networks, choosing the optimal path for data to travel to its destination. Switches, on the other...

…example of a social engineering attack. These attacks leverage the communication capabilities of the Internet to target unsuspecting users (Gomes et al., 2020).

Conclusion

In conclusion, the Internet is a highly complex network supported by an integrated infrastructure of local and international devices. Overall, it facilitates global communication but it also harbors risks of cybercriminal activities. Understanding the foundational elements of Internet communicationthe major networking building blocks and their functionsis crucial to comprehending how cybercriminals exploit vulnerabilities for malicious purposes. Software applications, especially web browsers, are frequent targets due to their inherent vulnerabilities. Protecting against these vulnerabilities requires a combination of technical measures, such as regular software updates and robust security protocols, and awareness of social engineering tactics. Because we are going to rely on the Internet for nearly all aspects of our lives for the foreseeable future, it is necessary that people understand and develop a fuller sense of how it works, its underlying mechanisms and its potential vulnerabilities…

Sources used in this document:

References

Gomes, V., Reis, J., & Alturas, B. (2020, June). Social engineering and the dangers of phishing.

In 2020 15th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-7). IEEE.

Kim, T. H., & Reeves, D. (2020). A survey of domain name system vulnerabilities andattacks. Journal of Surveillance, Security and Safety, 1(1), 34-60.

Lone, Q., Korczy?ski, M., Gañán, C., & van Eeten, M. (2020). Saving the internet: Explainingthe adoption of source address validation by internet service providers. In Workshop on the Economics of Information Security.

Malviya, V. K., Rai, S., & Gupta, A. (2021). Development of web browser prototype withembedded classification capability for mitigating Cross-Site Scripting attacks. Applied Soft Computing, 102, 106873.

Sunyaev, A., & Sunyaev, A. (2020). Internet Architectures. Internet Computing: Principles ofDistributed Systems and Emerging Internet-Based Technologies, 83-124.

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now