Question

In: Computer Science

Assignment; For this component, you will write a report or critique on the paper you chose...

Assignment; For this component, you will write a report or critique on the paper you chose from Assignment 1. Your report should be limited to approx. 1500 words (not including references).

Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises.

Citation of sources is mandatory and must be in the IEEE style.

TOPIC: Social Engineering and phishing attacks

Your report or critique must include: Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs).

Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results discussed and discuss the conclusions of the article and how they are relevant to the topics of this Unit of Study.

3 Conclusion: A summary of the points you have made in the body of the paper. The conclusion should not introduce any ‘new’ material that was not discussed in the body of the paper. (One or two paragraphs) References: A list of sources used in your text. They should be listed alphabetically by (first) author’s family name. Follow the IEEE style.

Solutions

Expert Solution

ABSTRACT:

As the digital era matures, cybersecurity evolves and software vulnerabilities diminish, people, however, as individuals are more exposed today than ever before. Presently, one of the most

practiced and effective penetration attacks is social rather than technical, so efficient in fact, that

these exploits play a crucial role to support the greatest majority of cyber assaults. Social Engineering

is the art of exploiting human flaws to achieve a malicious objective.

In the context of information

security, practitioners breach defenses to access sensitive data preying particularly upon the human

tendency towards trust. Cybercriminals induce their victims to break security protocol forfeiting

confidential information propitious for a more targeted attack.

INTRODUCTION:

Social engineering attacks are not only becoming more common against enterprises and SMBs, but they're also increasingly sophisticated.

Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data.Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

The basis of a social engineering attack is to avoid

cyber security systems through deceit, exploiting the weakest link, the people involved.

Throughout the interaction, victims are unaware of the destructive nature of their actions. The social

engineer exploits innocent instincts, not criminal. Explicit methods such as threats or bribery do not fall

within the scope of social engineering. A talented practitioner of this discipline understands and

perceives social interaction patterns to manipulate the psychological aspects of the human mind.

2.1 Categories

A social engineering attack can be classified by one of two possible categories, hunting and

farming.

2.1.1 Hunting

This approach seeks to execute the social engineering attack through minimal interaction with the

target. Once the specified objective is achieved and the security breach is established, communication

is likely to be terminated. This is the most frequently used methodology to support cyber attacks and

as a rule, the modus operandi involves a single encounter.

2.1.2 Farming

Social engineering farming is not often practiced, nevertheless, this technique may be used for

situational purposes. The attacker aims to establish a relationship with the victim in order to extract the

information for a longer period of time.

2.2 Phases

In order to achieve a specified objective, social engineering attacks can range from a single encounter

to a series of operations, possibly involving several threat actors, intended to gather fragments of

related information from different sources. Attacks of this nature, even if dependent on a sole

interaction, typically consist of four distinct phases: research, hook, play and exit.

2.2.1 Research

A well known

sentence from Sun Tzu in The Art of War is: "Know your enemy", knowledge is power and in the

context of cyber security, the investment on this stage can be invaluable to unveil possible

vulnerabilities. Nevertheless, rather than executing a targeted attack, an experienced social

engineering is capable of exploiting chance encounters, and thus opening further opportunities with no

research prior to that point.

2.2.2 Hook

In this phase, the threat actor initiates the communication with the potential victim. He engages

the target, spins the story, builds a level of intimacy and takes control of the interaction.

2.2.3 Play

The play aims to accomplish the purpose of the attack, which can be to extract information or to

manipulate the target in order to compromise the system.

2.2.4 Exit

Lastly, the social engineering finalizes the interaction with the victim, preferably without arousing any

suspicions. After this last phase, the attacker is typically very difficult to track down.

2.3 Attack Spiral Model

This model indicates that as the process develops, the risks, although present throughout the entire

operation, increase both to the target and threat actor. Consequently, so does the complexity of the

attack, social engineers often have a comprehensive consideration of risk assessment throughout

each phase.

3 ATTACK VECTORS

An attack vector is a path or means by which the attacker can gain access to exploit system

vulnerabilities, including the human element.

3.1 Social Approach

The attack vectors in social approach can be arise through different acts, tailgating, impersonating,

eavesdropping, shoulder surfing, dumpster diving, reverse social engineering and others.

3.1.1 Tailgating

Tailgating is the act of following an oblivious human target with legitimate access through a secure

door into a restricted space. The attacker may ask the victim to hold the door, or can simply reach for

it and enter before it closes.

3.1.2 Impersonating

As the name implies, the threat actor assumes a false identity to gain credibility as a basis to carry out

following malicious actions, like piggybacking, pretexting .

Piggybacking, similarly to tailgating, the attacker aims to gain physical entry to secured areas. In this

case however, acquires permission from the person with legitimate access by impersonating business

entities, like personnel that require temporary admittance.

3 Information Technology

3.1.3 Eavesdropping

Within a company, the personnel may simply discuss classified matters out loud if expecting only

authorized employees to be present. Just for being at the right place at the right time, threat actors can

exploit security breaches of this nature.

3.1.4 Shoulder surfing

Refers to the act of direct observation by surfing over the victim's shoulder to collect personal

information, typically used for extracting authentication data.

3.1.5 Dumpster diving

A classical practice for acquiring sensitive information among attackers is to simply look for it through

the garbage. Often, individuals and organizations, do not adequately dispose of documents, papers

and even hardware from which can be retrieved confidential data.

3.1.6 Reverse social engineering

The threat actor entices the target to be the one to initiate the interaction and lies in wait, reducing the

risk of arousing any suspicions. The attacker creates and plays a persona that appears to be trusted,

fabricates a problem for the victim and, indirectly, presents a viable solution.

3.1.7 A Recurrent Social Attack Example

A recurrent social attack example in six steps.

First step, an attacker extracts the target's email

address and phone number through research, often with ease.

Second step, the threat actor initiates

the attack by sending a message to the potential victim

Third step, the attacker, impersonating the victim, requests a legitimate

password reset from Google.

Fourth step, Google sends the password reset verification code to the

actual victim.

Fifth step, the victim, expecting the message from Google, follows the previous instructions and forwards the code to the attacker.

Sixth step, with the code, freely given by the victim,

the atacker simply resets the password and gains complete access to the account.

3.2 Socio-Technical Approach

The social-technical approach can be arise through different situations, phishing, baiting, watering

hole and others.

3.2.1 Phishing

Phishing attacks attempt to extract personal identifiable information through digital means, such as

malicious emails that appear to be from legitimate sources and websites.

3.2.2 Baiting

The attacker can use this physical attack vector by infecting a storage medium with malware, leaving it

to be found by the targeted victim, who may naively plug it into the system.

3.2.3 Watering hole

After researching, the attacker identifies one or more legitimate websites regularly visited

by the target. Searches for vulnerabilities, infects the most propitious website for the attack and lies in

wait.

3.2.4 A Socio-Technical Attack Example

Kali is a Debian Linux based operating system for penetration testing purposes, providing an arsenal

of tools designed for analysing and exploiting system vulnerabilities. Funded and maintained by

Offensive Security, Kali Linux is a renowned open source project used by cyber security professionals

and enthusiasts.

The Social-Engineer Toolkit (SET), with over two million downloads is heavily supported within the

cyber security community. Created by the founder of TrustedSec as an open source, menu driven,

penetration testing tool, SET is now the standard framework for assisting advanced technological

attacks in social engineering environments. To initiate the execution in Kali Linux all that is necessary,

is to simply type "setoolkit" on the terminal, also accessible through the applications menu.

Once the software executes, users are presented with a simple main menu that provides six options,

and another one to exit the program . Given the subject of this paper, this attack demonstration

is naturally focused on the first option, social engineering attacks. This attack example is a

rudimentary phishing attempt of the website vector nature, and thus, in the social engineering attacks

menu that follows, “Website Attack Vectors” is selected .

By applying social engineering techniques, induces the victim to commit the mistake of submitting

the targeted credentials. Once the victim visits the link and enters the username and password, the

login credentials are redirected to the Kali Linux server

CONCLUSION

The Information Age is maturing, complemented by an extremely increased usage of the Internet;

humanity evolves rapidly as the growth of public accessible knowledge has been greatly nurtured and

facilitated. Consequently, an unmistakable dependence on the World Wide Web has been established

in civilization. Recent

studies have shown that people are at the core of the infection chain in the greatest majority of cyber

attacks. Social engineering is increasing both in sophistication and ruthless efficiency, because

people, make the best exploits.

REFERENCES:

Cloudflare, 2019. cloudflare. [Online]

Available at: https://www.cloudflare.com/learning/security/threats/phishing-attack/

[Accessed 15 04 2019].

Fatima Salahdine, N. K., 2019. Social Engineering Attacks: A Surve. MDPI, 11(4), pp. 1-17.

Jaafar M. Alghazo, Z. K., 2013. Social Engineering in Phishing Attacks in The Eastern of Saudi Arabia.

Asian Journal of Information Technology, 12(3), pp. 91-98.

Moscaritolo, A., January 29, 2019. Beware: Phishing Attacks Are on the Rise, New York: PCMag.

Mosin Hasan, N. P. a. S. V., 2010. CASE STUDY ON SOCIAL ENGINEERING TECHNIQUES FOR

PERSUASION. International journal on applications of graph theory in wireless ad hoc networks and

sensor networks , 2(2), pp. 17-23.


Related Solutions

For this Assignment: Write a 2- to 3-page critique of the article. In your critique, include...
For this Assignment: Write a 2- to 3-page critique of the article. In your critique, include responses to the following: Why did the authors use multiple regression? Do you think it’s the most appropriate choice? Why or why not? Did the authors display the data? Do the results stand alone? Why or why not?
Artificial Intelligence Opinion Paper For this assignment I want you to write an opinion paper on...
Artificial Intelligence Opinion Paper For this assignment I want you to write an opinion paper on whether you believe AI - artificial intelligence, is ever going to become as sophisticated as the human mind. In your paper you should cite 2-3 sources (websites, research articles, etc) that help support your thought process. The paper should be 2-3 pages long, 12-point font, double spaced.
For this assignment, you are to write a 3-5 page paper (At least an outline) What...
For this assignment, you are to write a 3-5 page paper (At least an outline) What ethical issues are often faced in long-term care, and how are they resolved? Include examples.
critique the significance of research report writing
critique the significance of research report writing
This assignment will require you to write a 300-word APA style essay paper with references on...
This assignment will require you to write a 300-word APA style essay paper with references on the topic of Net-Neutrality The paper should focus specifically on the following: What is Net-Neutrality and your position on the subject - for or against and why? How does Net-Neutrality impact digital forensics? Should Internet Service Providers (ISP's) be liable for computer crimes committed on their networks? Does Net-Neutrality support freedom of speech - if yes or no, why?
For this assignment, you will write a paper explaining employee vs. independent contractor classifications using the...
For this assignment, you will write a paper explaining employee vs. independent contractor classifications using the Madrid and Berne case scenario provided below. Scenario: Madrid and Berne is a top-rated accounting firm with offices in Phoenix and Tucson. Madrid and Berne wanted to provide bookkeeping as an additional service to its clients. It has hired Joan Newman Business Services, with offices in Phoenix, Flagstaff, Tucson, and Yuma, to perform contract bookkeeping services for Madrid and Berne clients who request and...
I need to write a final paper for my managed care course. I chose to do...
I need to write a final paper for my managed care course. I chose to do mine on diabetes and managed care as I am a type 1 diabetic. However, I need some ideas for this paper on what to write regarding diabetes and the relation to managed care.
You are to prepare and submit a two-three-page paper that will critique the in-service program and...
You are to prepare and submit a two-three-page paper that will critique the in-service program and process based on the following headings: Can some help me start a paper Your Presentation : HOW COVID 19 AFFECT PEOPLE WITHDISABILITIES Your Group - registration The In-Service as a Whole Recommendations for Class 2021 based upon lessons learned Creation of a Dashboard based upon the totality of the experience. This dashboard should include key indicators of the in-service preparation process, risk areas and...
In this assignment, students are required to write a report and do a presentation on a...
In this assignment, students are required to write a report and do a presentation on a new business management practice. They need to analyse the selected Business to come up with answers for the following questions: • Name and introduction of the Business • Size of the business and Product Features • What are the capital sources for the new business and how they are obtained? • What are the challenges and difficulties that might be expected for the example...
Assignment Content Imagine you have been asked by your local paper to write an article on...
Assignment Content Imagine you have been asked by your local paper to write an article on the use of Electronic Health Records (EHRs) in health care. Write a 350- to 700-word article for the paper in which you: Explain the functions and advantages of using EHRs. Explain the relationship between paper forms and EHRs. Describe the basic flow of information within a health care organization using EHRs. Cite any outside sources to support your assignment.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT