What Is Social Engineering
What Is Social Engineering
Select victim
After performing in depth research on the target company. The attacker chooses the key
victim attempt to exploit to grab sensitive and useful information. Disgruntled
employees of the company are a boon to the attacker . the attacker tries to find these
employees and lure them to reveal their company information. As they are dissatisfied
with the company, they may be willing to leak or disclose sensitive data of the company
to the attacker
Develop relationship
Exploit he relationship
2. What is computer based social Engineering?
Computer – based social engineering depends on computers and internet
systems to carry out the targeted action. The following are the ways by which
the attacker can perform computer-based social engineering:
Phishing
Fake Email:
Pop –up windows attack: A pop-up windows appears and it displays an
alert that the network was disconnected and need to re-login. Then a
malicious program installed by the attacker extracts the target’s login
information and sends it to the attacker’s email or to a remote. This
type of attack can be accomplished using Trojan and viruses.
Spoofing identity: Identity spoofing is a method followed by attackers. Here people are
deceived into believing that a particular email or website has originated from the source
which actually is not true.
Changing prices: One more of problem related to SQL injection is it can be used to
modify data. Here the attackers enter into an online shopping portal and change the
prices of product and then purchase the products at cheaper rates.
Tamper with database records: The main data is completely damaged with data
alteration; there is even the possibility of completely replacing the data or even deleting
the data.
Escalation of privileges: Once the system is hacked, the attacker seeks the high
privileges used by administrative members and gains complete access to the system as
well as the network.
Denial-of-service on the server: Denial-of-service on the server is an attack where users
aren't able to access the system. More and more requests are sent to the server, which
can't handle them. This results in a temporary halt in the services of the server
9. Difference between Symmetric and Asymmetric encryption?
The basic difference between these two types of encryption is that symmetric
encryption uses one key for both encryption and decryption, and the asymmetric
encryption uses public key for encryption and a private key for decryption
Symmetric encryption is less complex and execute faster but asymmetric inscription is
complex and slower in execution
Asymmetric more secure than symmetric encryption as it uses two keys for the process.
symmetric encryption algorithms include AES-128, AES-192, and AES-256. But
asymmetric encryption techniques include RSA, DSA, and PKCS
Symmetric encryption is an old technique, while asymmetric encryption is the newer
one.
10. Describe briefly Public key infrastructure [PK]?
Today, organizations rely on PKI to manage security through encryption. Specifically, the most common
form of encryption used today involves a public key, which anyone can use to encrypt a message, and a
private key (also known as a secret key), which only one person should be able to use to decrypt those
messages. These keys can be used by people, devices, and applications.