Verified Document

Phishing As A Social Engineering Attack Essay

Related Topics:

Communication on the Internet

Introduction

The Internet has become so ingrained in our society today that it is impossible to imagine day-to-day life without it. Thiry years ago, this was not the casebut all aspects of life have changed do to this technological advancement. The challenge is that the Internet may create as many problems as it solves. In one sense, for example, it can be seen as a double-edged sword, offering boundless information and connectivity while also serving as a playground for cybercriminals. Understanding online communication and how it works is necessary to grasp how cybercriminals exploit vulnerabilities to their advantage. This paper looks at the mechanisms of Internet communication, focusing on the major networking building blocks and their functions, followed by an exploration of software applications' vulnerabilities, particularly within web browsers.

Networking Building Blocks and Their Functions

The Internet's architecture is built upon several critical components that work in tandem to facilitate seamless communication across the world. These components include Internet Service Providers (ISPs), protocols, routers and switches, domain name systems, and content delivery networks (Sunyaev & Sunyaev, 2020). Each does something different in the processes of the Internet.

ISPs act as the gateway for individuals and organizations to access the Internet (Lone et al., 2020). They provide the necessary infrastructure for digital data transmission over vast distances, connecting users to the global network. Protocols are rules that define how data is transmitted over the Internet. The most fundamental protocols include the Transmission Control Protocol (TCP) and the Internet...

Parts of this document are hidden

View Full Document
svg-one

TCP ensures reliable delivery of data by establishing a connection between the sender and receiver, while IP addresses are used to identify devices on the network, ensuring data reaches its correct destination.

Routers and switches are devices that direct data traffic on the Internet. Routers route data packets across networks, choosing the optimal path for data to travel to its destination. Switches, on the other...

Parts of this document are hidden

View Full Document
svg-one

…example of a social engineering attack. These attacks leverage the communication capabilities of the Internet to target unsuspecting users (Gomes et al., 2020).

Conclusion

In conclusion, the Internet is a highly complex network supported by an integrated infrastructure of local and international devices. Overall, it facilitates global communication but it also harbors risks of cybercriminal activities. Understanding the foundational elements of Internet communicationthe major networking building blocks and their functionsis crucial to comprehending how cybercriminals exploit vulnerabilities for malicious purposes. Software applications, especially web browsers, are frequent targets due to their inherent vulnerabilities. Protecting against these vulnerabilities requires a combination of technical measures, such as regular software updates and robust security protocols, and awareness of social engineering tactics. Because we are going to rely on the Internet for nearly all aspects of our lives for the foreseeable future, it is necessary that people understand and develop a fuller sense of how it works, its underlying mechanisms and its potential vulnerabilities…

Sources used in this document:

References

Gomes, V., Reis, J., & Alturas, B. (2020, June). Social engineering and the dangers of phishing.

In 2020 15th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-7). IEEE.

Kim, T. H., & Reeves, D. (2020). A survey of domain name system vulnerabilities andattacks. Journal of Surveillance, Security and Safety, 1(1), 34-60.

Lone, Q., Korczy?ski, M., Gañán, C., & van Eeten, M. (2020). Saving the internet: Explainingthe adoption of source address validation by internet service providers. In Workshop on the Economics of Information Security.

Malviya, V. K., Rai, S., & Gupta, A. (2021). Development of web browser prototype withembedded classification capability for mitigating Cross-Site Scripting attacks. Applied Soft Computing, 102, 106873.

Sunyaev, A., & Sunyaev, A. (2020). Internet Architectures. Internet Computing: Principles ofDistributed Systems and Emerging Internet-Based Technologies, 83-124.

Cite this Document:
Copy Bibliography Citation

Related Documents

Engineering Curriculum Content Engineering Curriculum Acquiring Engineering...
Words: 1055 Length: 3 Document Type: Essay

Engineering Curriculum Content Engineering curriculum Acquiring Engineering education is essential in training good quality engineer who afterwards becomes equipped to take up challenging task and responsibility as they undertake their duty. As one who is bestowed with responsibilities of administering an institution with limited resources and assigned to take part in revising the engineering curriculum that can accommodate more number of graduates, it is important to have necessary curriculum contents. As time passed

Engineering Ethics
Words: 2105 Length: 7 Document Type: Research Paper

Engineering Ethics Ethics and Morality Related to the Field of Engineering The purpose of this paper is to define engineering ethics in brief, here the discussion will also be about why successful engineers should be able to inspire trust and confidence in others where their integrity and honesty is concerned. Some references will also be given regarding why college students have to be loyal before they step into the practical world. All

Engineering Ethics in the Study
Words: 1904 Length: 7 Document Type: Research Paper

2009). This gives a strong idea of where the ethical onus lies in the practice of engineering. Another rather more expansive case study can be derived form the current state of bridges in the United States, and the general state of disrepair of many bridges that are still n regular heavy use (Harris et al. 2009). A rating system has been developed that determines when a bridge should be put

Engineering Career in Aerospace Engineering
Words: 1596 Length: 5 Document Type: Essay

When you begin a career, you may not be sure what skills you are lacking, so working part-time, taking an internship, or even volunteering could help prepare the student for what the job entails, and make them more comfortable as they begin their career. As the career develops, the engineer may begin to see skills that are lacking, such as English writing, or team building, or many other aspects of

Engineering Code of Ethics Asme.
Words: 1053 Length: 4 Document Type: Annotated Bibliography

S. standards on foreign companies. Cascio, W.F. "Decency Means More than 'Always Low Prices': A Comparison of Costco to Wal-Mart's Sam's Club." Academy of Management Perspectives (August 2006). Accessed 18 June 2012 from: http://www.ou.edu/russell/UGcomp/Cascio.pdf This source is an article that appeared in the professional Journal, Academy of Management Perspectives. It provides a comparison of Wal-Mart and Costco from the perspective of their respective ethical approaches to various issues. Generally, the author contrasts the manner

Engineering Ethics Case Study
Words: 1976 Length: 6 Document Type: Case Study

Engineering Ethics This post-mortem report is directed to the British Petroleum (BP) board of directors concerning the BP Texas City refinery explosion incident that took place on March 23, 2005. A series of explosions occurred during the restarting of the hydrocarbon isomerization unit in the Texas City refinery. The main technical reason behind the initial explosion was the flooding of the over-pressurized distillation column, which ended up in a geyser of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now