URBE Students summer 2006 - N822

This Blog has been created by Professor Patricia Mendoza in order to share information of a specific topic with 2006 URBE's summer Class N822

Saturday, August 05, 2006

Hello URBE's summer students Class N812. Welcome !!
Please, be so kind and search information in the net about
SOCIAL ENGINEERING
and let's share it...
Important facts?: Definition, other terms related (shoulder surfing, password sniffing...) Sicological profile, Behavior, Common Procedures, How to avoid it...
AND YOUR OWN OPINION OF COURSE!!
If you paste information from a web site, please call the source

28 Comments:

Anonymous Anonymous said...

FREDY GONZALEZ N-822.

They can frequently be found in the Online Internet Gaming community.
Insecure personal password policies amongst gamers will often give the unscrupulous user access to gamer’s other types of account.

Users of Internet systems frequently receive messages that request password or credit card information in order to "set up their account" or "reactivate settings" or some other benign operation in what are called phishing attacks.

Users of these systems must be warned early and frequently not to divulge sensitive information, passwords or otherwise, to people claiming to be administrators. In reality, administrators of computer systems rarely, if ever, need to know the user's password to perform administrative tasks.

I am not in agreement with name that receive these people. they must be called to hacker social

11:57 AM  
Anonymous Anonymous said...

a social engineer is a person who trick you in your face , he can get your credit car password when he`s talking with you at a bar, or mall, also he can get your personal information to do something against your person.We could say that he do kind of the same job as a hacker do.

Laurenzy Urdaneta - N812

1:02 PM  
Anonymous Anonymous said...

The Social engineering is the practice of obtaining confidential information by manipulation of legitimate users.
By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes.
A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam).
Basically, social engineering is the art and science of getting people to comply to your wishes.
Attempting to steer an individual towards completing your task can use several methods. The first and most obvious is simply a direct request, where an individual is asked to complete your task directly.
One of the essential tools used for social engineering is a good memory for gathered facts. This is something that hackers and sysadmins tend to excel in, especially when it comes to facts relating to their field. To illustrate this I am going to perform a small demonstration.
axel castillo n822

1:10 PM  
Anonymous Anonymous said...

the social engineering used to be a dirty wayto take information from a company.today is a hacker tactic to know what other organizations are doing in order to aplly their methods in your company. there are people hired today to make that job ."and well paid" by the way...
"The basic goals of social engineering are the same as hacking in general: to gain unauthorized access to systems or information in order to commit fraud".
not only computer information can be taken by a social engineer, they also can look for human resources, working methods, etc...
ELISA MENDEZ

1:10 PM  
Anonymous Anonymous said...

social engineer is a person who brake normal security procedures to access the network in order to steal information that compromises the network's security. When hackers can't get your password they send messages. One way which has become very popular is called password sniffing or broadcast technology.
Elvia Andrades N822

1:14 PM  
Anonymous Anonymous said...

is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies.
Also social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.

1:15 PM  
Anonymous Anonymous said...

Social engeneering is a practice or an art when someone trick other people and get from they their personal infomation, like credit card number or any information he needs. To get the information they need, they used the natural human tendency to trust and manipulated people for do what they want to do.
The information they obtain is in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network.
Laynet Moreno
N822

1:18 PM  
Anonymous Anonymous said...

Name: Romaira Finol
Section: n822
English VIII

SOCIAL ENGINEERING
Is a person who uses some psychological tricks of users of a computer system, in order to obtain information that they need. The basic goals of social engineering are the same as hacking in general: to gain unauthorized access to systems or information in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network.

Common Procedures.
They use the phone by attack, example:

They’ll call you in the middle of the night: ‘Have you been calling Egypt for the last six hours?’ ‘No.’ And they’ll say, ‘well, we have a call that’s actually active right now, it’s on your calling card and it’s to Egypt and as a matter of fact, you’ve got about $2,000 worth of charges from somebody using your card. You’re responsible for the $2,000, you have to pay that...’ They’ll say, ‘I’m putting my job on the line by getting rid of this $2,000 charge for you. But you need to read off that AT&T card number and PIN and then I’ll get rid of the charge for you.’ People fall for it.”
My opinion
It is a word that is not correct to use it, so that is an offense for the engineers of any type, since eas is not the function of the engineers… in addition is a crime and the people must have well-taken care of these people and not giving keys, numbers of credit cards and others.

1:23 PM  
Anonymous Anonymous said...

Byron Castro C.I:17804103
ENGLISH VIII
N822


The social engineering is the practice of obtaining confidential information by manipulation of legitimate users. The social engineer use the telephone or internet to trick people into revealing sensitive information or getting them to do something that is against typicals police.

The sicological profile: These people are very very intelligent and clever but the social engineer also is crazy for money because more social engineers works in sensitive situation.


How to protect yourself from social engineers:
• Be careful not to disclose information to someone you don’t know over the phone, through email, or when using the Internet.
• Don’t share personal information though Internet chat rooms.
• Understand how information will be used before sharing it with merchants.
• Know if you have a choice in how your information is used and shared.
• Have checks printed by reputable check vendors (like the credit union’s preferred provider)
• Don’t include your Social Security Number, driver’s license or other information on requests for printing checks.
• Limit the number of items with personal information and account numbers in your wallet when you travel.

1:24 PM  
Anonymous Anonymous said...

Social engineering is the practice to obtain the confidential data by the manipulation of users. A social engineer will use the telephone or the Internet to trick to people in revealing the sensible information. The social engineers operate the holes of the security of the computer.
The simple attack that still he is effective is to deceive a user being taken it to think that one is an administrator of the system and asking for a password for several intentions. The users of systems of Internet frequently receive messages that ask for passwords or information of credit card, with the reason "to create an account".
Social engineering also is applied to the act of expensive manipulation face to face to obtain access to the computation systems.
Ernesto Ferrer
ID: 15.406.754
N822

1:24 PM  
Anonymous Anonymous said...

Ingenieria social this related to the people who of some or another form try to obtain confidential data violating the security of the computers (hackers). The social engineer changes to all the natural tendency of the people violating the security and taking information by the Internet.

A social engineer is the person who mounts attacks to take certain information that is to them of importance for other people and they are contracted and receive money to rob information to him confidential of other people.

INGLES VIII SECC: N822
SIMON FERNANDEZ ID: 16782468

1:24 PM  
Anonymous Anonymous said...

Social Engineering can be defined as the art of tricking people to reveal sensitive information about networks or computer systems, to gain access to them. This is usually done by Internet, phone or even personal contact, and it would be done with employees or authorized personnel to gain access to passwords or even access the physical installation. The social engineer usually concentrate on the weakest link of the computer security chain; this means, they focus on someone with access to the system, and it’s always centered on people’s weaknesses like their vanity. Social engineering also relies on the fact that people is not aware of the value of the information they posses, so frequently social engineers would memorize codes by looking over someone’s shoulder; this is known as shoulder surfing, or take advantage on people’s tendency to use meaningful things for them that can be easily guessed. Another way for social engineers to get passwords can be password sniffing, which consists on programming a computer to read all the messages sent through the network. To avoid it people should be educated on the value of information, how a social engineer works, and training people to protect their information.

Maria A. Gimenez
ID:17.504.023
N822

1:26 PM  
Anonymous Anonymous said...

Yairana Palmar N822

A social engineering is an outside hacker who use psychological tricks or breaks into a system and often ask for your passwords, like your credits cards, claiming to be some kind of highly known organization.

This persons are very smart and clever, because they purpose is to obtein any kind of information unauthorized that they need and use it in order to commit fraud, industrial espionaje or network intrusión.

A shoulder surfing is a person who looks over your shoulder to watch when you type your password in a computer. So in order to prevent this acts you must be carefull in crowded places, and always look around to be sure nobody is watching you!!!

There are many ways this hackers attack; they can do it by phone pretending to be someone in a position of authority or relevance, by on line pretending to be the network administrator, by persuasion creating the perfect psychological environment for the attack, by a method call Dumpster diving where some items as potential security leaks are may be trash in companies like company phone books, organizational charts, memos, among others, or by a more advanced method call reverse social engineering where they create a person that seems to be in a position of authority so that employees will ask him for information and then this person provided that to others.

When I first read the title I thought this might mean something related to some kind of carreer, but when I finally read about it I realize what really means Social engineering, but I don´t agree that people call them engineering, they are ingenious, of course, but what they are doing is against the law, so for me it´s like an insult.

1:32 PM  
Anonymous Anonymous said...

CARLOS MONTENEGRO - N-822
Social engineering(security):this kind of persons, trying to get confidential information´ users in these days they use the internet to trick people to get information.

A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam). After earlier malicious e-mails led software vendors to disable automatic execution of e-mail attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.

Most articles I’ve read on the topic of social engineering begin with some sort of definition like “the art and science of getting people to comply to your wishes an outside hacker’s use of psychological tricks on legitimate users of a computer system, in order to obtain information he needs to gain access to the system”, or getting needed information (for example, a password) from a person rather than breaking into a system . In reality, social engineering can be any and all of these things, depending upon where you sit. The one thing that everyone seems to agree upon is that social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. The hacker’s goal is to obtain information that will allow him/her to gain unauthorized access to a valued system and the information that resides on that system.

Important facts
social engineer get the information on the fact, some people don´t be carefull or are not aware of the information they have,and are careless about how protect it, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone's shoulder (shoulder surfing), or take advantage of people's natural inclination to choose passwords that are meaningful to them but can be easily guessed.

How to keep the information safe
Security experts said that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.


Social engineering as politycal science:, i think it is a some kind of influence use by the governments and others states to change the minds of people and populars attitudes and social behavior

all law and governance has the effect of changing behavior I think can be considered "social engineering". Prohibitions on murder, rape, suicide and littering are all policies aimed at discouraging perceived undesirable behaviors. changing public attitudes about a behaviour is accepted as one of the key functions of laws prohibiting it. Governments also influence behavior more subtly through incentives and disincentives built into economic policy and tax policy, for instance, and have done so for centuries and last governments.

1:39 PM  
Anonymous Anonymous said...

CARLOS MONTENEGRO C.I:16622320 SECCION N-822
Social engineering(security):this kind of persons, trying to get confidential information´ users in these days they use the internet to trick people to get information.

A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam). After earlier malicious e-mails led software vendors to disable automatic execution of e-mail attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.

Most articles I’ve read on the topic of social engineering begin with some sort of definition like “the art and science of getting people to comply to your wishes an outside hacker’s use of psychological tricks on legitimate users of a computer system, in order to obtain information he needs to gain access to the system”, or getting needed information (for example, a password) from a person rather than breaking into a system . In reality, social engineering can be any and all of these things, depending upon where you sit. The one thing that everyone seems to agree upon is that social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. The hacker’s goal is to obtain information that will allow him/her to gain unauthorized access to a valued system and the information that resides on that system.

Important facts
social engineer get the information on the fact, some people don´t be carefull or are not aware of the information they have,and are careless about how protect it, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone's shoulder (shoulder surfing), or take advantage of people's natural inclination to choose passwords that are meaningful to them but can be easily guessed.

How to keep the information safe
Security experts said that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.


Social engineering as politycal science:, i think it is a some kind of influence use by the governments and others states to change the minds of people and populars attitudes and social behavior

all law and governance has the effect of changing behavior I think can be considered "social engineering". Prohibitions on murder, rape, suicide and littering are all policies aimed at discouraging perceived undesirable behaviors. changing public attitudes about a behaviour is accepted as one of the key functions of laws prohibiting it. Governments also influence behavior more subtly through incentives and disincentives built into economic policy and tax policy, for instance, and have done so for centuries and last governments.

1:41 PM  
Anonymous Anonymous said...

Gabriel Mantilla C.I 16587702
Section N822

Social Engineering

It is the art or practice use by people to gain important and confidential information; these engineers exploit the tendency of a person to trust his or her word. An important fact of this practice is that is non-technical, rather than try to break into a computer system they use social methods to gain access to someone confidential information.

Examples of social engineering and common Procedures

Shoulder surfing is another way to gain access to confidential information by memorizing access codes by looking over someone's shoulder.

Online Internet gaming community and password sniffing this is done by briefing users with the intent of extorting account passwords and game serial numbers can give previously banned cheaters access to online play sometimes also users of Internet systems frequently receive messages that request password or credit card information in order to "set up their account" that is done by someone gathering information from the users in order to use it for there own gain

Sicological profile a social engineer is a person that has very good social skills (easygoing, friendly, extroverted) as technical knowledge of computer systems as well as a good memory for gathered facts, he or she is very clever in trying to manipulate or trick the victim so that can give the information that they are trying to gain access.

How to avoid it

Many people specially security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.

1:42 PM  
Anonymous Anonymous said...

Summer 2006:
N822
Liriana Martinez

A social engineer is a person who looks pretty friendly, reliable, and easygoing, but in the real world they are unreliable totally, and a very dangerous person.

A social engineering used to breaks normal security process, trying to gain the confidence of someone who can access the network in order to get them to reveal information that can be danger, if it is confidential for the person or for a company maybe. Usually a social engineer used to call workers with some kind of urgent problem. And alter that they still the most important information that is confidential.
Another common trick that is use for social engineer is to known as shoulder surfing. This means that somebody looks over your shoulder while you type in your password. If you are suspicious of somebody, don't type your password until they have gone. If you think somebody has seen your password, change it after they're gone. Don’t lost time. This is very common in the real life, for example, when you are buying in a store you must be careful with your passwords if you are going to pay with credits card.
For a social engineer the strategy is to make a person more likely to cooperate with him. They don’t force people to complete their tasks, but enhance their voluntary compliance with your request.
If you want to be carefully you should not have a usual password, try to avoid the names of your children, your birthday, your I.DI and others…. this information is used to guess your password.
So, you are the only one person in charge to take care of your passwords. Because you can't be sure how this person is going to use your account, or whom else they might let use it. They can do countless things with it.

1:46 PM  
Anonymous Anonymous said...

Social Engineering refers to the process of actually hacking people instead of machines.Social engineering also applies to the act of face-to-face manipulation to gain physical access to computer systems.Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust.
The Internet is fertile ground for social engineers looking to harvest passwords. The primary weakness is that many users often repeat the use of one simple password on every account: Yahoo, Travelocity, Gap.com, whatever. So once the hacker has one password, he or she can probably get into multiple accounts. One way in which hackers have been known to obtain this kind of password is through an on-line form: they can send out some sort of sweepstakes information and ask the user to put in a name and password.
How to avoid social engineering:
Be careful not to disclose information to someone you don’t know over the phone, through email, or when using the Internet.Don’t share personal information though Internet chat rooms.Don’t include your Social Security Number, driver’s license or other information on requests for printing checks.
Fabiana Acosta n822

1:48 PM  
Anonymous Anonymous said...

Social engineering is the manipulation of id, credits cards, passwords and any kind of personal things that that kind of people can use in their own benefit.
Social engineering applies to electronical attacks and also to attacks face to face. One way to do electronical attacks is by asking on messages about password, credit card information and in that way they can stole their money or they can get some important information that the social engineer needs or simply want it. And one way to do it face to face can be by using alcohol and seduce the person in order to get the information they want.

One of the must famous person who do it, is Kevin David Mitnick. He was born in August 6, 1963. And he was in prison for five years because he broke into the computer system of motorola, fujitsu, nokia and Sun Microsystems. He was restricted from using any communications technology other than a landline telephone, although occasional exceptions were granted.

by.. gisselle vera
N-822

1:48 PM  
Anonymous Anonymous said...

Definition.
A social engineering is a person, who use psychological tricks to convince other people to do what they want. Also they use the manipulation of the natural human tendency to trust to get and get more people. They show themselves as a friendly person, who is searching information very slowly to obtain the mayor information, break the walls to access all information that they want.

Terms Related.
They know as hackers, socio-technical attacks.

Psychological profile.
The person shows themselves as friendly person. The hackers themselves teach social engineering from a psychological point-of-view, emphasizing how to create the perfect psychological environment for the attack. Basic methods of persuasion include: impersonation, ingratiation, conformity, diffusion of responsibility, and plain old friendliness.

How to avoid it?
The only thing that you can do to avoid this social engineering is training your guards to stay alert to identify this kind of person.

Ivan Ivanoff (n-822)

1:48 PM  
Anonymous Anonymous said...

Social engineering

Basically, social engineering is the art and science of getting people to comply to your wishes. A social engineer will use many tools with the telephone, Internet or presonalitly.

Also some of the best hackers will use social engineering techniques and find a new a victim in the wed.

In the case of social engineering it is no security at all. Because many people can discovery your number security in the bank that is very dangerous or have access at your job by the computer.

In order to prevent the swindle with expert people it is necessary to have well-taken care of with people that we do not know or installing programs of security in our computers.

andrea flores T822

1:52 PM  
Anonymous Anonymous said...

The concept of Social Engineering is a term that describes a not technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer will commonly use the Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies.

One of the essential tools used for social engineering is a good memory for gathered facts.Perhaps the simplest, but a still effective attack is tricking a user into thinking one is an administrator and requesting a password for various purposes. Users of Internet systems frequently receive messages that request password or credit card information in order to set up their account or reactivate settings or some other benign operation in what are called phishing attacks. Users of these systems must be warned early and frequently not to divulge sensitive information, passwords or otherwise, to people claiming to be administrators. In reality, administrators of computer systems rarely, if ever, need to know the user is password to perform administrative tasks. Social engineering also applies to the act of face-to-face manipulation to gain physical access to computer systems. Training users about security policies and ensuring that they are followed is the primary defense against social engineering. Ricardo Romero

1:52 PM  
Anonymous Anonymous said...

yiner amesty ;)


Social engineering is a concept in political science that refers to efforts to influence popular attitudes and social behavior on a large scale, whether by governments or private groups. In the political arena the counterpart of Social engineering is: Political engineering.

For various reasons, the term has been imbued with negative connotations. However, virtually all law and governance has the effect of changing behavior and can be considered "social engineering" to some extent. Prohibitions on murder, rape, suicide and littering are all policies aimed at discouraging perceived undesirable behaviors. In British and Canadian jurisprudence, changing public attitudes about a behaviour is accepted as one of the key functions of laws prohibiting it. Governments also influence behavior more subtly through incentives and disincentives built into economic policy and tax policy, for instance, and have done so for centuries.

In practice, whether any specific policy is labeled as "social engineering" is often a question of intent. The term is most often employed by the political right as an accusation against any who propose to use law, tax policy, or other kinds of state influence to change existing power relationships: for instance, between men and women, or between different ethnic groups. Political conservatives in the United States have accused their opponents of social engineering through their promotion of political correctness, insofar as it may change social attitudes by defining "acceptable" and "unacceptable" language or acts.

Social engineering through history
Before one can engage in social engineering, one must have reliable information about the society that is to be engineered, and one must have effective tools to carry out the engineering. Both of these only became available relatively recently - roughly within the past one hundred years. The development of social science made it possible to gather and analyze information about social attitudes and trends, which is necessary in order to judge the initial state of society before an engineering attempt and the success or failure of that attempt after it has been implemented. At the same time, the development of modern communications technology and the media provided the tools through which social engineering could be carried out.

While social engineering can be carried out by any organization - whether large or small, public or private - the most comprehensive (and often the most effective) campaigns of social engineering are those initiated by powerful central governments.

Extremely intensive social engineering campaigns occurred in countries with authoritarian governments. In the 1920s, the revolutionary government of the Soviet Union embarked on a campaign to fundamentally alter the behavior and ideals of Soviet citizens, to replace the old social frameworks of Tsarist Russia with a new Soviet culture, to create the New Soviet man. The Soviets used newspapers, books, film, mass relocations, and even architectural design tactics to serve as "social condenser" and change personal values and private relationships. Similar examples are the Chinese "Great Leap Forward" and "Cultural Revolution" program and the Khmer Rouge's plan of deurbanization of Cambodia.

Non-authoritarian regimes tend to rely on more sustained social engineering campaigns that create more gradual, but ultimately as far-reaching, change. Examples include the "War on Drugs" in the United States, the increasing reach of intellectual property rights and copyright, and the promotion of elections as a political tool. The campaign for promoting elections, which is by far the most successful of the three examples, has been in place for over two centuries.

Social theorists of the Frankfurt School in Weimar Germany like Theodor Adorno had also observed the new phenomenon of mass culture and commented on its new manipulative power, when the rise of the Nazis drove them out of the country around 1930 (many of them became connected with the Institute for Social Research in the United States). The Nazis themselves were no strangers to the idea of influencing political attitudes and re-defining personal relationships. The Nazi propaganda machine under Joseph Goebbels was a synchronized, sophisticated and effective tool for creating public opinion.

In a similar vein the Greek military junta of 1967-1974 attempted to steer Greek public opinion not only by propaganda but also by inventing new words and slogans such as: palaiokommatismos (translated as old-partyism), Ellas Ellinon Christianon translated as: Greece of Christian Greeks, Ethnosotirios Epanastasis translated as Nation-saving Revolution meaning coup d'état etc.

Social engineering can be used as a means to achieve a wide variety of different results, as illustrated by the different governments and other organizations that have employed it. The discussion of the possibilities for such manipulation became especially active following World War II, with the advent of television, and continuing discussion of techniques of social engineering - particularly in advertising - is still quite pertinent in the western model of consumer capitalism.
http://en.wikipedia.org/wiki/Social_engineering_(political_science)

My personal opinion the social engineering is justt a Swindler.
Because,Which is the reason in order that it(he,she) does it?.And the deberiamos conciderar almost engineers profecionales,For the ingenuity that they use to achieve an aim

2:05 PM  
Anonymous Anonymous said...

For me the is very important, because describe the technical kind the hackers and others people to break normal security procedures. The fisrt, security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.
Finally the social engineering relies on people's inability to keep up with a culture that relies heavily on information technology.
The best protection against social engineering is awareness by users through education. People reveal information to social engineers because they are unaware that they are doing anything wrong. Often, they will not realize they have been victimized, even after the hacker uses the information given them for illicit purposes.
Gustavo Gotera
N822

6:25 PM  
Anonymous Anonymous said...

Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible.
A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam). After earlier malicious e-mails led software vendors to disable automatic execution of e-mail attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.

Perhaps the simplest, but a still effective attack is tricking a user into thinking one is an administrator and requesting a password for various purposes. Users of Internet systems frequently receive messages that request password or credit card information in order to "set up their account" or "reactivate settings" or some other benign operation in what are called phishing attacks.

raquel nicolaas briceño
n822

2:47 PM  
Anonymous Anonymous said...

social engeneering is the person have the hability to infiltrate into a electronic dispositive to get confidencial information, is like a hacker, but also in my opinion is like a psicologyst because he can talk to the person make the person trust in his o her word just so he can get the cuestion he want.. social engeneer also can get into sites that need some kind o password.. electronic pages who are protected by firewall, antivirus, etc.. like bank accounts, credit card numbers... in concluding a social engeneer is a very persuasive person who has to be very good whit computers.

anis mouhtar
N-822

8:43 PM  
Anonymous Anonymous said...

Carlos Teixeira 16109780
n-822

Social engineering is manipulating people into doing what you want, in much the same way that electrical engineering is manipulating electronics into doing what you want.

The classic social engineering attack is telephoning legitimate users of a system you wish to access and talking them out of their passwords.


Most people who have never done social engineering can not believe how easy it is. Alternatively, most people who are naturally good at social engineering are not the sort of people you would want to let into your home. Social engineering is basically lying, and people who lie well tend to do it regularly.

9:41 AM  
Blogger PatMendoza said...

Ok guys I’ve been very pleased with your investigation and everybody demonstrated in the exam how your research was... Congrats!!, you did a pretty good job and I hope you’ve really learned and enjoyed working with the topic.
I’ll see you around and KEEP ON the good work!!

6:40 PM  

Post a Comment

<< Home