Social Engineering: A Hindrance To Information Security

Read Complete Research Material



[Social Engineering: A Hindrance To Information Security]

by

Acknowledgement

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

Abstract

This dissertation is based on the topic of “Social Engineering: A Hindrance to Information Security”. This paper presents an analysis of the impact of social engineering on information security. The first chapter provides an introduction to the topic. Theoretical framework and hypotheses are also included in this chapter. The second chapter covers the literature review on the topic. The methodology is presented in the third chapter, followed by discussion of results in the fourth chapter. The fifth chapter is based on conclusions and implications for the future research.

Table of Contents

ABSTRACT4

CHAPTER 1: INTRODUCTION7

Background8

Problem Statement9

Purpose of the Study10

Objectives of the Study11

Significance of the Study11

Theoretical Framework12

Hypotheses15

CHAPTER 2: LITERATURE REVIEW24

Threat assessment and control27

Proposed strike cycle of the ASE bot29

Map & Bond30

Execute31

Recruit & Cloak31

Evolve/Regress31

Information Security32

Phishing34

Spear Phishing34

Dumpster diving35

Ethical Issues35

Attack model36

Special Sources Required37

Chatbots37

Implementation of chatbot38

Evaluate the prototype38

A. Impersonation39

B. Trust40

C. Diffusion41

D. Overloading/Strong affect41

E. Moral Duty42

F. Reciprocation42

G. Urgency42

H. Direct Approach43

Social Engineering Methods43

A. Corporate Website43

B. Google Search44

C. Job Sites44

D. Public Venues45

E. Dumpster Diving46

Mitigation49

A. Policy49

B. Physical Security50

C. Acceptable Use51

D. Help Desk52

E. Improvements53

Social engineering training could disrupt botnet growth53

Preventing attacks with social engineering training55

Diminishing the Impact of Social Engineering56

CHAPTER 3: METHODOLOGY58

Instrumentation: sample and data collection59

Experimental procedures60

Treatment Procedures61

Punishment Treatment Group62

Ethics Training Group63

Social engineering training group63

CHAPTER 4: RESULTS AND DISCUSSION65

Results65

Discussion68

CHAPTER 5: CONCLUSION69

Limitations70

Implications for research71

Implications for practice72

Conclusion76

REFERENCES77

APPENDIX85

Social Engineering: A Hindrance to Information Security

Chapter 1: Introduction

Merriam-Webster Online Dictionary defines social engineering as the management of people to their place and function in society: applied social sciences "(Acquisti, 2005, 33). This famous and politically correct definition that is acceptable to the social engineers, chemists, physicians, and mathematics to compare. An alternative definition that many computer-oriented websites link slang definition "File" - "A term used among crackers for cracking techniques that rely on weaknesses in wetware, no software, getting people to passwords and other information Trick goals that a target system security is compromised. "(Albrechtsen, 2006, 51)

It's jargon-rich is difficult to understand layman. Lay definition, and is still by far the most concise and accurate "old-fashioned manipulation". As Western countries, the transition from an industrial to a postindustrial, information security is rapidly becoming increasingly important for companies mainly in Western Europe, Asia and the United States. Focus involved in the corporate and individual information of particular importance for the company in e-commerce, such as financial institutions adopted by e-retailers (eBay, Amazon, etc.) and online stock trading (ShareBuilder, Ameritrade, etc.) should be aware, however, all types of companies show the importance of information security.

Background

Social engineering is not a new concept. The social engineering tactics were used by Odysseus and Sinon to get the wooden horse outside ...
Related Ads