answersLogoWhite

0

Social Engineering

Social engineering is the term given to the techniques involved in tricking people to divulge sensitive information. Questions about these techniques and how to avoid being scammed belong here.

364 Questions

How come some people could never admit to their faults or mistakes?

User Avatar

Asked by Wiki User

We are all guilty at some point in our lives for not admitting to our faults or mistakes and it's simply the emotional situation we are in at the time. If the person is an abuser they don't often realize they are doing it. The fallacy that the abuser has come from an abusive family and it is a learned emotion is not always true (although a high percentage indicates this is true.) Some abusers come from a very good family and often the abuser was simply spoiled and given all the rights to their every whim. Abusive people need psychiatric help as they don't feel in control of their own lives, can feel they are hard done by and generally hate the world. The only way they seem to strive in their own little world is by abusing their mate or children as it makes them feel as if they have the power. In an abuser's mind they can't abuse the whole world, so they choose a piece of the world which is their homelife. If people simply won't own up to their faults or their mistakes they have gone through life blaming others. They have ceased to mature. We all makes mistakes and we all have faults and it will take the rest of our lives to try and make ourselves a better person. Some faults are so minute that it doesn't really matter if we change them, but if our mistakes or faults are hurting someone else close to us or even hurting the public then we need to do something about it. Marcy Stalkers and the Borderline Personality The Borderline Personality In recent years psychologists have learned about and done case studies on a new personality disorder which the DSM-III-R classifies as an Axis II disorder- the Borderline Personality . This classification includes such personality disorders as the Anti-social Personality, the Histrionic Personality and the Narcissistic Personality. Several psychologists (including myself) diagonosed my stalker as afflicted with the Borderline Personality. Characteristic of the Borderline (derived from research done by Kreisman & Straus, 1989) are: a shaky sense of identity sudden, violent outbursts oversensitivity to real or imagined rejection brief, turbulent love affairs frequent periods of intense depression eating disorders, drug abuse, and other self-destructive tendencies an irrational fear of abandonment and an inability to be alone Not much research has been done on the Borderline Personality, and for many years it was difficult to diagnose- and to treat. A Borderline often feels as though his/her life is marked with a distinctive emptiness; a void in which a relationship often acts to fill. Many times the Borderline is a victim of an early dysfunctional family situation and/or emotional/physical abuse by those he/she trusted early on in childhood. The Borderline is psychotic , in the original, psychological meaning of the term: he/she is not in control and not in touch with reality. To the Borderline, a softly spoken word of advice can be construed as a threat on his/her emotional stability. An outsider's viewpoint that the Borderline is not in touch with reality often ends in a bitter and irrational dissassociation from the outsider on the part of the Borderline. Often, the Borderline ends up very much alone and victim to his/her disillusions. The Borderline stalker is very apt to see his/her actions as perfectly justified; he/she has paranoid disillusions which support these-often with disturbing frequency. The Borderline often has brief love affairs which end abruptly, turbulently and leave the Borderline with enhanced feelings of self-hatred, self-doubt and a fear that is not often experienced by rational people. When the Borderline's relationships turn sour, the Borderline often begins to, at first, harass the estranged partner with unnecessary apologies and/or apologetic behavior (i.e. letters of apology 'from the heart', flowers delivered at one's place of employment, early morning weeping phonecalls, etc.). However, the Borderline does not construe his/her behavior as harassment- to the Borderline he/she is being 'responsible' for his/her past behaviors. The next phase of the Borderline Personality develops relatively quickly and soon he/she feels suddenly betrayed, hurt, etc. and seeks to victimize the estranged partner in any way he/she can Strangely enough, this deleterious behavior is always coupled with a need to be near or in constant contact with the estranged partner . While sending threats to the estranged partner, it is very common for the Borderline to begin to stalk his/her estranged partner in an effort to maintain contact. This effort is motivated by the excruciating fear that the Borderline will end up alone and anger that [the estranged partner] has put him/her in this position. We are finding, in many cases, that a great deal of stalking behavior is associated with Borderline or related personality disorders. Earlier research did not incorporate the Borderline Personality in stalking profiles; research now is beginning to focus on the Borderline in such disorders as Erotomania, etc.

What is reverse social engineering?

User Avatar

Asked by Wiki User

An attacker using reverse social engineering to obtain information will present himself as an authority offeringhelp on a particular subject, so that his targets come to him for advice. This is in contrast to simple social engineering, where the attacker portrays himself as needing help.

Does the fjords of western Canada provide shelter for ships and animals?

User Avatar

Asked by Wiki User

if i'm not mistaken, it's protection for water craft and protection for animals.

What are measures for preventing social engineering attack?

User Avatar

Asked by Wiki User

Social engineering attacks are when people manipulate others into giving them sensitive information. For instance, an employee may receive a call from a person claiming to be that company's IT department, saying that they need that person's password to help them repair problems with the company's computer system.

Phishing is one type of social engineering attack, where you receive an email that tricks you into giving the wrong people your information. They pretend to be a company that you trust, maybe claim that they are having system problems, and say you need to change your password. However, they send you their link, not the actual one.


So can this be prevented? One is a personal passphrase. A legitimate company might ask its users to provide a passphrase. Then the company uses that phrase in every email they send. Since the phishers only have your email address and don't know you, they will not be able to duplicate that phrase. Oh, they could hack into the site and get it, but if they could do that much, they would not need you to give them a password nor other information. They would just take it. So if every message from your bank has a subject heading that ends in "spaghetti sandwich" then you'd know that any emails without the phrase would be fake.


Better company policies can help too. For instance, employees can be trained to never give certain information over the phone. So if someone from an IT department needs any information from you, they could walk to your department and ask for it in person. Or, an employee could add their own tests or personal policy to the situation. So if an unfamiliar person asks for a password to a computer at work, they could tell the person to visit them or ask their supervisor. Just refuse to give that out over the phone, and call any bluffs to have you fired.


Other than that, just be wise and not be naive. If someone tells you that if you fill out a certain form with your email and password and the email of an enemy, that they can hack your enemy for you, don't fall for it. You just told them how to hack you. If someone says you won a contest and that they need your bank account to either remove a processing fee or to deposit your winnings, don't give it to them. If you really won, they won't ask for a fee. If you receive an email from the IRS telling you that you need to pay them, you must realize that the IRS never emails you a bill. They will contact you first in writing. After that, they might call or visit you.

What is a social engineering attack?

User Avatar

Asked by Wiki User

Any attempt to gain information by the act of tricking another.

Is information security an application of social science?

User Avatar

Asked by Wiki User

Because social science deals with how people behave and "social engineering" is one of the techniques to defeat information security, it would seem that at least some aspects of information security are related to social science. Other areas where information security and social science would overlap would include: speparation of duties, roles and responsibilities, acceptable ue policies, and policy enforcement.

What is an example of a mitigation activity?

User Avatar

Asked by Wiki User

Building earthquake-resistant structures n earthquake zones is a mitigation activity.

Which precautions help to protect against social engineering in the workplace?

User Avatar

Asked by Wiki User

There are two primary things needed to help protect against social engineering, whether at work or in the home. First is awareness. Companies need to provide ongoing user awareness training where they show their employees the risks and various ways hackers attempt social engineering. These sessions also very much apply to home use. One great resource is the SANS organization, a computer security training organization that offers many free resources, including a regular newsletter geared specifically to the end user. The second thing, common sense, can never be underestimated when considering it's importance. If someone calls you asking for your password, or some other piece of information, see if it passes "the sniff test". Does something smell fishy with the request? Then it probably is. When in doubt, err on the side of caution and double check before giving out any information.

What god was the god of the harvest?

User Avatar

Asked by Wiki User

Saturn is the Roman god of harvest or reaping, and Demeter is the Greek goddess of the harvest.

Which two actions can be considered social engineering attacks?

User Avatar

Asked by Wiki User

Phishing, baiting and tailgating are all examples of social engineering attacks.

Would you wear a uniform?

User Avatar

Asked by Wiki User

doctors ,students , teachers , soldiers.ect.

What are the measures for preventing a social engineering attack on your computer?

User Avatar

Asked by Wiki User

AVG anti-viruses is a very good program that protects you from hackers and viruses. Also zonealarm is very a good program it is a firewall and a anti-viruses program.

In terms of software development the answer is more complex. A large number software security issues can be mitigated by performing proper input validation.

All users should be alert and report a user you do not recognize?

User Avatar

Asked by Wiki User

It is always important to be alert of users that are not recognized. Reporting them can be a good thing at times. It can be a safety measure taken to prevent harm to other users.

How do you match each example to the type of local social engineering attack each corresponds to?

User Avatar

Asked by Wiki User

An answer to the question as written, is "none of the above." If you would like a meaningful answer, submit question again. Next time include examples instead of just cutting and pasting part of your homework here.