Verified Document

General Aspects On Social Engineering Research Paper

Social Engineering as it Applies to Information Systems Security The research takes into account several aspects that better create an overview of the term and the impact it has on security systems. In this sense, the first part of the analysis reviews the concept of social engineering and the aspects it entails. Secondly, it provides a series of cases that were influenced by social engineering and the effects each had on the wider picture of information security. Thirdly, the research looks at what policies are set in place to avoid this type of practice and how has the information security society responded to the threat posed by social engineering. Finally, possible solutions to the issues social engineering raises are also presented in the context of the increased technological environment in which business is conducted in the world we live in today.

General aspects on social engineering

A non-academic definition of what social engineering stands for has been provided in several instances as the matter grew in attention and more cases of such "behavior" became known. Putting it bluntly, "Social engineering aims to exploit the weakest link in information security -- people. Just as in historical examples in which people were manipulated into meeting one's ends, social engineering is grounded in the same principle. Yet social engineering does not necessarily need the use of technical methods. By nature, people tend to be helpful and polite. Social engineering techniques take advantage of this intrinsic nature to manipulate people into divulging sensitive information" (Schneier, 2009). At a first glance, it can be argued that the concept takes into account human nature as a default condition for their activity. More precisely, social engineering and a successful individual who practices this endeavor focuses on the social nature of an individual and transforms this part of the personality into a weakness. From a first perspective, it is fair to say that social engineering as a practice uses people to achieve different goals, in this particular case information that would have otherwise be restricted by security protocols.

A more formal definition of social engineering provides a stricter description of the practice. In this sense, "Social engineering is the practice of obtaining confidential information by manipulation of legitimate users" (Allen, 2006). Under this definition, the term incurs several considerations. On the one hand, it must be pointed out that the incentives for this practice are represented by the acquisition of confidential information. In general, it is not considered social engineering, the access to public information that would otherwise be available to everyone. Therefore, a first aspect is related to the fact that social engineering implies a breach of security and automatically of the law. Secondly, it must be pointed out that those that are targeted by social engineers are the individuals and links that handle this type of information, the legitimate users of the information. From this point-of-view and given a general outlook, in fact, it is not the social engineer that is committing a wrongdoing but rather the authorized user for divulging the information. Therefore, it can be noted that social engineering as a practice is in fact a manipulation of the human component of a security system.

Aside from the legitimate users that are targeted and involved in the process, the social engineer, the individual that is carrying out the process, plays the main role. It must be pointed out from the onset that the term "engineering" and "engineer" does not necessarily reflect a technical nature of the activity undergone by such an operator. It is the definition of the term engineering that refers to "calculated manipulation or direction (as of behavior)" that needs to be taken into account (Merriam-Webster, n.d.). The social engineer in this case is, more or less, the individual who engages in such a manipulation activity with the purpose of obtaining information. A more comprehensive definition is that a social engineer is "a hacker who uses brains instead of computer brawn" (Allen, 2006).

The term "hacker" has often been associated in the popular belief with activities that relate strictly to Internet or web-based processes that focus on breaching security of information in an informational environment that includes hardware, computers, software firewalls and other IT related security measures. In this case however, the raw material that such hackers use are the personality and individuality of human beings. This is an important aspect to be taken into account especially given that in such circumstances, the possibilities to limit social engineering are rather limited and...

In this sense, Microsoft considers that "To attack your organization, social engineering hackers exploit the credulity, laziness, good manners, or even enthusiasm of your staff. Therefore it is difficult to defend against a socially engineered attack, because the targets may not realize that they have been duped, or may prefer not to admit it to other people. The goals of a social engineering hacker -- someone who tries to gain unauthorized access to your computer systems -- are similar to those of any other hacker: they want your company's money, information, or IT resources." (Microsoft, 2014)
Although most of the situations that have been investigated by Security did in fact prove to be social engineering, there are also cases in which a person can engage into such an action without actually knowing that he or she is committing a breach. In this sense, "Social engineering attacks can essentially be executed by accident or with the best of intentions by an innocent "attacker" whose motivations are generally benevolent. Understanding the breadth of possibilities for social engineering attacks to compromise a system, and the fact that the attacker may often not even consider its actions an attack, can help you arm yourself against social engineering" (Perrin, 2010) This is an important aspect to be taken into account particularly because it is rather difficult to ascertain precisely the rational behind one attack or another at the level of a working environment for example. This mention is particularly done for such cases in which, without a clear consideration for creating in fact a pattern or a malicious act, people may look over their shoulder into their colleague's computer and this does not necessarily need to be an act of social engineering.

There are numerous techniques used by social engineers in conducting their activities. Most of do not include the use of any type of technological devices. In this sense, according to manuals that have been written to assist companies, individuals, and governments alike to safeguard their employees from such social engineering, the most common techniques are the ones that are based strictly on other human beings not being careful enough or being to over police and trusting. In this sense, some of these techniques include shoulder surfing, "dumpster diving," or mail-outs (Allen, 2006) As it can be seen, all these type of procedures are based on the social interaction with one or more individual. While shoulder surfing represents a more personal approach, as the social engineer would need to be in the vicinity of the targeted user, dumpster diving can occur more often. Even so, according to surveys conducted among employees from different environments email phishing is seen as most common. In this sense, "Phishing -- pretending to be a trustworthy entity in an electronic communication -- was identified as the most typical source (47%), followed by social networking sites such as LinkedIn that allow new employees to be targeted (39%)" (Dimension Research, 2011). Finally, mail-outs are seen among the most common means to gather information about people who could include passwords, pins, private information about work place, income, and even marital status. An example in this sense are the questionnaires or various links that become viral on the Internet and, when interpreted correctly, can provide a considerable amount of information about individuals and then be used either against them or for different purposes.

The rational and motivation of social engineering is firstly one of material gain for the engineers. Most often from a general perspective, social engineers can either sell the information gathered or can use it to their own personal advantage. Another motivation for conducting this activity is also personal revenge. In this sense, according to a study conducted, "51% of social engineering attacks are motivated by financial gain - 14% of social engineering attacks are motivated by revenge" (Dimensional Research, 2011). Other reasons include competitive advantage and personal vendetta. There are numerous cases in which personal revenge has been used as a motivation for social engineering and, despite the fact that people conducting activities such as shoulder fishing were not aware of the name of this type of process, the information gathered was used against the rightful owner of that information,…

Sources used in this document:
References

Allen, Malcolm. "Social Engineering: A Means To Violate A Computer System," SANS Institute, 2006, available online at https://www.sans.org/reading-room/whitepapers/engineering/social-engineering-means-violate-computer-system-529

Dimension Research. "The Risk Of Social Engineering On Information Security:

A Survey Of It Professionals" in Dimension Research, Sept. 2011, available online at http://www.checkpoint.com/press/downloads/social-engineering-survey.pdf

Honan, Mat. "How Apple and Amazon Security Flaws Led to My Epic Hacking" in Wired. 8 June 2012, available at http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/
Harper, Allen et al. "Grey Hat Hacker: the Ethical Hacker's handbook." 2011, Ebook, available online at http://mirror.ebooks-it.org/e-books/mcgraw-hill/McGraw.Hill.Gray.Hat.Hacking.The.Ethical.Hackers.Handbook.3rd.Edition.Jan.2011.ISBN.0071742557.pdf
Merriam -- Webster. "Engineering." N.d. available online at http://www.merriam-webster.com/dictionary/engineering
Microsoft. "How to Protect Insiders from Social Engineering Threats." 2006. Available online at http://technet.microsoft.com/en-us/library/cc875841.aspx
Penetration tests with a social-engineering angle" in Network World, October 25, 2007, available online at http://www.networkworld.com/newsletters/2007/1022sec2.html
Perrin, Chad. "Mitigating the social engineering threat" in IT Security, 2010, available online at TechRepublic, http://www.techrepublic.com/blog/it-security/mitigating-the-social-engineering-threat/#.
Schneier, Bruce. "Social Engineering: People Hacking" in Enterprise Risk Management, 2009, available online at http://www.emrisk.com/knowledge-center/newsletters/social-engineering-people-hacking
Symantec. Francophoned. August 2013, available online at http://www.symantec.com/connect/blogs/francophoned-sophisticated-social-engineering-attack)
Winkler, Ira. "Security Tips: Social Engineering The Non-Technical Threat to Computing Systems" in Computing Systems, Volume 9, Number 1, Winter 1996, available online at https://www.utdallas.edu/infosecurity/STsocial.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Social Networking in the Education
Words: 2393 Length: 7 Document Type: Essay

Therefore, managing texting threads and system security will be a major concern. User comfort must be ensured. Social networking administrators must be trained and designated. In her book on online teaching, Tisha Bender explores this challenge. Discussion -- based online interaction is primarily textual. It can be synchronous or asynchronous. The key is adapting ourselves to the online environment. We need to be able to function without the visual cues

Social Construction of Technology SCOT
Words: 3250 Length: 10 Document Type: Term Paper

Social Construction of Technology Technology …almost everything is negotiable: what is certain and what is not: who is a scientist and who is a technologist; what is technological and what is social; and who can participate in the controversy. (Pinch & Bijker, 1984) The Social Construction of Technology (SCOT) is a theory within several areas including philosophy of technology, sociology of science, and science & technology studies. The theory was developed in the

Engineering Ethics to Prevent Suicidal Attempts Death
Words: 2307 Length: 7 Document Type: Essay

Engineering Ethics to Prevent Suicidal Attempts Death and mortality rates in the recent decades have escalated at an unprecedented rate all across the globe. Suicide is one of the integral attempts of numerous people in order to end the beautiful gift of life given by God. However, while taking the United States into account, it is prudent to note that suicide is amongst the leading causes of death where the ratio

Social Commerce in Saudi Arabia
Words: 4858 Length: 14 Document Type: Research Proposal

Social Commerce in Saudi Arabia: How the Social Media Affect the E-Commerce in Saudi Arabia SOCIAL COMMERCE IN SAUDI ARABIA Conceptual Framework Model Social Media Psychological Aspect and Theories Administration Digital Divide in Saudi Arabia Ethos, Religious conviction, and Government in E-commerce Adoption The Rise of the PR Industry in Saudi Arabia Conceptual Model and Research Hypothesis (Drawing) Research Contribution Social Commerce in Saudi Arabia Modern Saudi Arabia today actually represents an exceptional and convergent mixture of social conservatism and technological ability,

Social Media As a Potential Tool in Conflict Resolution a Facebook...
Words: 10855 Length: 25 Document Type: Thesis

Social Media as a Potential Tool in Conflict Resolution: A Facebook Perspective Humans are social animals, and will usually dwell together in communities, based on their beliefs, resources, preferences, needs, risks, and a number of other conditions which may be present and common, affecting the identity of the participants and their degree of cohesiveness. Community In sociology the word community is often used to refer to a group that is organized around common

General Motors GM Is One
Words: 6236 Length: 25 Document Type: Thesis

" Conclusion Overall GM is currently confronting some of the most difficult obstacles that it has ever had to overcome. Government intervention is no guarantee that the company will be able to overcome these obstacles. Billions of dollars have been given to the company in an effort to save it from further demise. However, capital alone will not save the company, there must be a strategic effort of the management to properly

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now