Social Engineering essays

8 samples in this category

Essay examples
Essay topics
Introduction “Everything that you have access to, short of your own family, the identity thief masquerading as you has access to.” In his book, Stealing your life, Frank W. Abagnale precisely sums up the danger of identity theft in mentioned quote. What would you do if you woke up and find that you are being impersonated and that person committed a crime? In a day and age where connectivity is key, data is extremely easy to access. The new currency...
6 Pages 2632 Words
Abstract While an image of a person with high technical skills exploiting the system has been used many times to demonstrate a hacker, a new type of attack is changing that, it’s called the Social Engineering attack. This paper will go deeper into explaining what Social Engineering is and the principle behind it. Popular attacks based on Social Engineering will be mentioned and explained in detail how one attack is executed. The appearance of Social Engineering in our surrounded digital...
5 Pages 2099 Words
Introduction When thinking about the security of information systems, the predominant concern is with digital security. Performing evaluations and assessments to identify risks and vulnerabilities that may comprise the information stored within the system. However, often is the case the largest threat and easily exploitable vulnerability is overlooked, humans. Some of the biggest hacks of all time were made possible by social engineering. These breaches have caused financial, reputational, and social damage to both companies and individuals alike. Social engineering...
8 Pages 3529 Words
Abstract In the Cyberspace domain, the rate of cyber-attack is rising every day. This reason initiates the need to encourage individuals to become Cyber Warriors. To have a better understanding of a Cyber Warrior, we need to know the training, requirement, skills, and knowledge to obtain and also its difference with a traditional warrior. Social engineering attacks have now become very successful, looking at the fact that most of technical devices are unreliable to prevent such attacks. The best way...
6 Pages 2805 Words
Does Social Engineering Really Work? Does social engineering really work? Yes, I believe it does. The main two reasons that I believe social engineering in the context of cybercrime works, is because firstly, it targets what I think is the weakest link in any digital security system, the human. The second reason why I believe social engineering works is because it has been around since humans have existed. It is still used to this day. Why? Because it works. The...
3 Pages 1397 Words
Chapter 1: Literature Review What is Social Engineering? The term Social Engineering is simply the process of manipulating the user into disclosing either his sensitive information or his personal identifiable information (which could be referred to as PII) to the social engineer. According to (Conteh and Schmick, 2016) social engineering is also known as human hacking. Additionally, it is regarded as the hacker’s strategy to trick and manipulate people’s tendency to trust and engage in a specific behavior online for...
8 Pages 3465 Words
After reflecting on the quote from Dr. Thomas Plante about social engineering and learning about behavior intervention, I believe that both approaches can lead to effective behavior change depending on what the behavior is. I agree with Dr. Plante’s quote to an extent because it can be very hard for people to make significant, lasting behavior changes in their lives using just willpower alone, even if they know what they’re doing is bad for their health. However, even with social...
1 Page 473 Words
Penetration testing is an attempt to evaluate the degree of security of IT or any functioning infrastructure by attacking it from various aspects. There could be many vulnerabilities in an IT system which could be exploited to perform unauthorized actions on the system. That is why penetration testing is done on the system beforehand to make it immune to those attacks. But then also, there is the issue of ensuring that the human element of the infrastructure do not compromise...
1 Page 485 Words
price Check the price of your paper
Number of pages
Email Invalid email

By continuing, you agree to our Terms of Use & Privacy Policy.

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most
Place an order

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via

Check it out!