Tuesday, February 18, 2020
CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay
CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING SOCIAL ENGINEERING FOR CYBER ATTACKS - Essay Example In their actions, hackers in the contemporary society use the most sophisticated of malware to attack information systems and networks in ways never seen before. Nevertheless, the initial role of social engineering in these attacks is core and cannot be overlooked due to the technologies used. Social engineering is hackersââ¬â¢ equivalent of a con or a trick, which makes the target people or systems to think someone, something or an action, is safe, trustworthy and familiar while in reality it is not (Kiountouzis & Kokolakis, 2011). The most common of social engineering con tricks often involve the hacker sending an e-mail to the target person or system. This e-mail if first tailored so that it appears to have come from a trustworthy sender. However, these con e-mails often contain links that when opened or clicked, directs a computer to a malware, which is in turn downloaded by the user on the target computer or system (Kiountouzis & Kokolakis, 2011). At this stage, the hacker em ploys the Remote Access Tool (RAT) to search through the computer network and/or infect other computers or networks. Social engineering is today exploited by hackers to bring down or access othersââ¬â¢ computer/information networks and obtain information in the comfort of their homes provided they are sure their target will most likely be sitting at their computers (Kiountouzis & Kokolakis, 2011). ... This paper explores the various types of cyber and security threats to which information and technology companies and there ISs are exposed and the role of employee alertness in averting these threats, particularly those originating from hackersââ¬â¢ using social engineering. In this regard, the paper is a case study of an information security breach at one of the most renown IT security firms in the United States, the RSA. After addressing how RSA responded to the breach, the paper explores the role of employee alertness in averting such threats in the future. However, it is of the essence to first have a general understanding of the various techniques that hackers use to breach information security systems and obtain information illegally. The Protection Motivation Theory This paper will employ the protection motivation theory to explain the role and importance of employee alertness in assisting IS firms in detecting and preventing security breaches via social engineering techni ques. According to this theory employees will always protect themselves based on certain core factors. These factors include but are not limited to the probability of the occurrence of a security threat or breach, the suspected or expected severity of the threat, the vulnerability of the possible victims, the efficacy of the response/preventive mechanisms or behaviours. The motivation to protect oneself and property emanates from the evaluation of threats as well as the ability to cope with the threats or its effects. In the threat assessment context, employees of IS and IT companies are expected to be able to appraise the severity of possible social engineering threats and the seriousness of the situation once it occurs. On the other hand, the coping
Monday, February 3, 2020
Research Paper Assignment Example | Topics and Well Written Essays - 250 words
Research Paper - Assignment Example America, unlike other powers before it, was declining in both power and influence at a fast rate. It therefore needed an event that could restore it back to its former glory as the strongest in the world. Contrary to the popular belief that the war was about oil, the gulf intrusion was not. The Gulf catered to only five percent of Americaââ¬â¢s oil needs. Therefore, losing five percent of oil in the process of gaining super power status was not be an issue for America. 2. John McArthur in his book Second Front: Censorship and Propaganda in the 1991 Gulf War: The press has its pimps as it has its policemen. The pimp debases it, the policeman subjugates it, and each uses the other as a way of justifying his own abusesâ⬠¦ but in another sense the press is better than intelligence or progress; it is the possibility of all that and other things as well. A free press can of course be good or bad, but most certainly, without freedom it will never be anything but bad. (199) Citizens are easily manipulated by the media and it is due to this factor that the government controls and manipulates the media, especially in times of war. The public may be denied information or duped into believing that an invasion would be good to them. 4. ââ¬Å"..driven by the imperatives of a rapidly globalizing cold war, the United States quickly dropped all pretense of championing decolonization, particularly in Southeast Asia. American policy makers not only encouraged, they actively intervened to facilitate Franceââ¬â¢s return to colonial domination in Indochina.â⬠(Adas, p. 29) 5. ââ¬Å"It is a budget of both opportunity and sacrifice. It begins to grasp the opportunities of the great society. It is restrained by the great sacrifice we must continue to make in order to keep our defenses strong and flexible.â⬠(Campagna, p. 32) The Americans were forced to allocate a lot of funds to continue sustaining the soldiers in Vietnam. This is despite the fact that most people were
Subscribe to:
Posts (Atom)