14 Feb 2023

58

Hacking: Social Engineering Tactics

Format: APA

Academic level: University

Paper type: Assignment

Words: 813

Pages: 3

Downloads: 0

The use of social engineering tactics has gained popularity over the recent past. This move has been associated with criminal attacks, usually termed as hacking. Various forms of social engineering tactics are used by hackers to exploit individuals, businesses, and other organizations. Usually, the main intentions of social engineering attacks are to manipulate victims into giving useful information such as passwords and bank information. Some of these tactics include phishing, tailgating, baiting, pretexting, whaling, vishing, and quid pro quo, among others. One of the most common forms of social engineering attacks is phishing. With phishing, the attacker mainly uses short message services (SMS), e-mails, or social media in an attempt to extract information from potential victims (Lord, 2019) . E-mail is one most used platforms for phishing. Mainly, the attacker may pose or impersonate a large organization (such as banks or other corporations) profile and tricks the target into following a link to an external website. The target may be asked to change the password and may be called to show the urgency. If the target clicks on the link, they become prone to ransomware attack (Jentzen, 2019). One of the recent examples is about Microsoft OneDrive, where attackers lured people into downloading documents from OneDrive (Jentzen, 2019) . The targets were directed to an authentic-looking page that was fake in real sense. They were required to put their credentials from which the attackers were able to capture their login credentials (Jentzen, 2019) . The other social engineering technique is tailgating. This technique mainly happens in areas that require electronic access (Nadeem, 2015) . An attacker, in this case, can ask one of the people with authorized access to hold the door for them. That way, they gain access to the company's information systems and execute their attacks. Another method is known as baiting. As the term suggests, this technique aims at exploiting the human mind. Although the method is usually confused with other tactics, this one comes with a promise of something good to the targets. A good example entails one whereby an attacker may use a malicious file that is disguised as some sort of software update (Dobran, 2018) . The other example that happens in the real world is through the use of infected Universal Serial Bars (USB) devices that are infected with the virus. Baiting then occurs when a member of an organization takes the device and inserts it into the company's computers, thereby allowing the attacker to access the corporate's system files (Dobran, 2018) . There are various social norms of the hacker subculture, as identified in various findings. One of these norms pertains to secrecy. In consideration of the fact that hacking is an illegal act, secrecy becomes one of the key components of hacker's subculture (Nadeem, 2015) . Activities related to hacking are kept secrets to avoid unwanted attention, such as that from the criminal justice system (Holt, 2005) . Anonymity is, therefore, indispensable as it allows them to conduct their activities through an unidentified character. The other norm common with the hacker subculture is technology. Hacking activities require technological presence (Nadeem, 2015) . A deep relationship between technology and the individual allows hacking to take place. An example is whereby the closeness to technology allows individuals to perform tasks and gain a better understanding of the processes related to hacking (Holt, 2005) . A such, technology forms a crucial part of the hacker subculture. The third social norm is the art of mastery, which is generally referred to as categorization. As an example, due to the emerging generations of hackers, there are conflicts between the older generations and the new. As such, some hackers are better than others and want to maintain the boundaries (Holt, 2005) . Law is the fourth component of social norms associated with the hacker subculture. With the law, some hackers may have various disregard for law enforcement (Nadeem, 2015) . Hackers, due to their sophisticated levels of expertise on their activities, fail to operate under regulations set by law enforcement agencies (Holt, 2005) . For example, these hackers have their laws that allow distinct activities that otherwise would be punishable by law enforcement agencies if identified. The hacker subculture requires knowledge as the other crucial component. With knowledge, individuals can perform high-level tasks with ease (Nadeem, 2015) . In the hackers’ society, the ability to perform and communicate in coded languages and understand is a key identification of status (Holt, 2005) . For example, hackers can communicate to share knowledge with the wider hackers' society. Communication is done in coding languages, and for one to understand, they require to be knowledgeable enough. This element forms the fifth component of hackers' subculture social norms or values. According to Goodwyn (2019), there is a sad tone regarding the stories of hacking. This tone can be attributed to the fact that hackers have caused huge issues in various states of the United States, among other cities. In areas where organizations refused to pay ransomware, they had to incur high additional costs to rebuild their systems. However, the larger society has contributed to the stigmatization of hackers through how they identify hackers. Deviant labels have been given to hackers by people who hold social powers. These acts make individuals associated with hacking to increase their rates of these illegal activities (Goodwyn, 2019) .

References 

Dobran, B. (2018, October 22). 17 Security experts on how to prevent social engineering attacks . Retrieved February 11, 2020, from PhoenixNap: https://phoenixnap.com/blog/prevent-social-engineering-attacks

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Goodwyn, W. (2019, June 9). Ransomware attacks create dilemma for cities: Pay up or resist? Retrieved February 11, 2020, from Npr: https://www.npr.org/2019/07/09/739999730/what-happens-when-hackers-hold-cities-hostage-with-ransomware-attacks

Holt, T. J. (2005, November 22). Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers. Retrieved February 11, 2020, from University of Missouri, St. Louis: https://irl.umsl.edu/cgi/viewcontent.cgi?article=1617&context=dissertation

Jentzen, A. (2019, May 17). The latest in phishing: May 2019 . Retrieved February 10, 2020, from Proofpoint: https://www.proofpoint.com/uk/security-awareness/post/latest-phishing-may-2019

Lord, N. (2019, July 15). Social engineering attacks: Common techniques & how to prevent an attack . Retrieved February 10, 2020, from Data Guardian: https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack

Nadeem, M. S. (2015, December 2). Social Engineering: What is Tailgating? Retrieved February 11, 2020, from Mailfence: https://blog.mailfence.com/what-is-tailgating/

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Hacking: Social Engineering Tactics.
https://studybounty.com/hacking-social-engineering-tactics-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 182

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration