Question

In: Computer Science

Choose one of the social Engineering Techniques and write a scenario how it could be used...

Choose one of the social Engineering Techniques and write a scenario how it could be used to manipulate others?

Solutions

Expert Solution

Social Engineering is method to convince or manipulate a person or a thing with out their own knowledge and gather the critical information from them.

There are different type's of Social Engineering techniques. We are going to discuss one of them.

Technique :-

Familiarity Exploit - In this technique , an attacker can become as a familiar person to the target and gather the information by different means. The attacker may interact with target during meals, when they are smoking he may join, on social events, etc. He may ask silly questions in order to become close enough. The targets are most likely to reveal answers as they trust the familiar face. Once attacker gains the trust of target, there is no stopping of flowing of information from the target, with out his knowledge.

Scenario : -

Let us assume you met your childhood schoolmate after long time and sharing the same room. The companies you work are biggest rival's. Your friend's manager got to know about you in a social event somehow. He plotted a trail for you using your friend as bait. Your friend started acting strange and close enough, taking very good care of you suddenly. He also spend a lot on you and giving you many presents in order to gain trust. Finally you became close enough to share your personal matters and as well as professional matters. There will be a never ending questions from your friend which does not involve directly related to profession, but he may gather information in indirect ways. Suddenly he has sent a mail to you , as he is familiar to you , you may open the mail and any attachments as well. But later found that the entire organisation is down due to a virus. On the same night , your friend came stating that he got promotion and transferred. Ways departed.  Later it was found that the root cause of the virus is from your desktop or system. You got fired as well due to breach of company policies and for flow of intel about the organisation. In one go , both of your lives has become upside down. Later it was found that your friend is the reason for this situation of your's.

Suggestion : -

Please do not speak about your professional matters with other's and do not open the mail's straight away even it is from you know from years. Proceed through the filtering procedure of mails and report to concern team if you found anything suspicious. Remember that email addresses are spoofed all of the time; even an email purportedly coming from a trusted source may have actually been initiated by an attacker.

Note : -

The above scenario is combination of familiarity exploit and phishing.


Related Solutions

List a number of appropriate pictorial techniques that could be used to represent an engineering component
List a number of appropriate pictorial techniques that could be used to represent an engineering component
How could television be used to improve social and political life?
How could television be used to improve social and political life?
1. Describe how the following immunological techniques could be used to diagnose a patient with an...
1. Describe how the following immunological techniques could be used to diagnose a patient with an infectious disease like COVID-19. a) ELISA b) Western blot analysis In addition, compare the benefits and uses of each technique.
Completely and thoroughly explain how the concepts of Engineering Economy could be used to help a...
Completely and thoroughly explain how the concepts of Engineering Economy could be used to help a company that makes paper products make a decision on whether or not they should invest in new equipment. You will need to include more information that what is presented in the lecture transcript for Engineering Economy.
Research the following notable engineering failures. Discuss how analysis was used or could have been used...
Research the following notable engineering failures. Discuss how analysis was used or could have been used to investigate the failure.    Highway I-880, Loma Prieta, California earthquake, 198
How could advanced-access techniques be used for the following types of facilities? a. Ambulatory surgery center...
How could advanced-access techniques be used for the following types of facilities? a. Ambulatory surgery center b. A free standing imaging center
How does interphase precipitation work for alloy hardening? Name two characterisation techniques that could be used...
How does interphase precipitation work for alloy hardening? Name two characterisation techniques that could be used to image interphase precipitation.
could you live without social media? In your opinion write one short paragraph.
could you live without social media? In your opinion write one short paragraph.
QUESTION 1 Briefly describe how social engineering can be used to take advantage of unwitting insider...
QUESTION 1 Briefly describe how social engineering can be used to take advantage of unwitting insider threats QUESTION 2 True or False - Insiders aren't threats unless they recently came from outside the organization True False QUESTION 3 Why is spear phishing particularly relevant to the problem of insider threats?                                 It is specifically crafted to bypass firewalls                                 It is specifically crafted to target computers running the Windows operating system                                 It is specifically crafted to appear relevant to...
how could mechanical engineering improve plastic recycle?
how could mechanical engineering improve plastic recycle?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT