Social engineering as a way of committing cyber crimes

Author(s):  
M.O. Yangaeva
Author(s):  
Nabie Y. Conteh

This chapter will discuss the important topic of ethical hacking, also known as penetration testing. It will start by explaining the constituents of ethical hacking: scope and goal setting, exploitation, and documentation. The authors will define and explain the reasons for the rapid rise in cyber-crimes and their socio-economic impact. It will further discuss the steps involved in ethical hacking, who is allowed to conduct ethical hacking, its importance, and the role it plays in deterring future and potential hackers. The chapter will analyze the various types of malware and the steps to follow to become an ethical hacker. It will further describe social engineering, the types of cyber-attacks, the phases of attack, testing for vulnerabilities, and it will put forward a list of countermeasures. The chapter will end by detailing the steps to be taken in the documentation process and crafting the executive summary.


2018 ◽  
Vol 13 (6) ◽  
pp. 1 ◽  
Author(s):  
Jason E. Thomas

One of the most difficult challenges in information security today is phishing. Phishing is a difficult problem to address because there are many permutations, messages, and value propositions that can be sent to targets. Spear phishing is also associated with social engineering, which can be difficult for even trained or savvy employees to detect. This makes the user the critical point of entry for miscreants seeking to perpetrate cyber crimes such as identity theft and ransomware propagation, which cause billions of dollars in losses each year. Researchers are exploring many avenues to address this problem, including educating users and making them aware of the repercussions of becoming victims of phishing. The purpose of this study was to interview security professionals to gain better insight on preventing users and employees from succumbing to phishing attack. Seven subject-matter experts were interviewed, revealing nine themes describing traits that identify users as vulnerable to attack or strongly resistive to attack, as well as training suggestions to empower users to resist spear phishing attacks. Suggestions are made for practitioners in the field and future research.


Author(s):  
Sanjeev Rao ◽  
Anil Kumar Verma ◽  
Tarunpreet Bhatia

Online social networks (OSNs) are nowadays an indispensable tool for communication on account of their rise, simplicity, and efficacy. Worldwide users use OSN as a tool for social interactions, news propagation, gaming, political propaganda, and advertisement in building brand awareness, etc. At the same time, many OSN users unintentionally expose their personal information that is used by the malicious users and third-party apps to perform various kind for cyber-crimes like social engineering attacks, cyber espionage, extortion-malware, drug-trafficking, misinformation, cyberbullying, hijacking clicks, identity theft, phishing, mistrusts, fake profiles, and spreading malicious content. This chapter presents an overview of various cyber-crimes associated with OSN environment to gain insight into ongoing cyber-attacks. Also, counter mechanisms in the form of tools, techniques, and frameworks are suggested.


Author(s):  
Isaac Chin Eian ◽  
Lim Ka Yong ◽  
Majesty Yeap Xiao Li ◽  
Yeo Hui Qi ◽  
Fatima Z

In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially. The number of people doing online activities such as e-learning, remote working, online shopping and others have increased. This has also led to increased vulnerability to cyber crimes. Cyber security attacks have become a serious problem. The common types of cyber security attacks are phishing, malware, ransomware, social engineering, identity theft and denial-of-service. The attackers target the victims in order to get their credential information or financial benefits. Those people who are doing online activities are vulnerable to cyber threats. This is because the network is not safe. The attackers are able to code according to the weaknesses of the Internet. Once the attackers hack into the devices, they have the root access and can do whatever they want to do with the device. In this research paper, the concept of cyber security attack and detailed research about real attacks are discussed. This is followed by detailed review about the recent cyber security attacks with a critical analysis. Moreover, the research paper will be proposing the latest research contribution of cyber security during COVID-19 and the implementation scenario which will give the examples about how the companies maintain privacy as well as the limitations. Then, the paper will be discussing the reasons that people are vulnerable to cyber security and the unique solution to the problems stated. Finally, this paper will conclude with an in-depth analysis and future direction for cyber security research.


Author(s):  
Anirudh Bharadwaj M

Cybercrimes have become as common as petty crimes and at every level we can face situations that make us vulnerable to cybercrimes through links, text messages on phones, scam phone calls etc. that demand to sensitive information and misuse them. The 2019-2021 Corona Virus (SARS-CoV-2) Pandemic has shown a drastic increase in cybercrimes. As use of technology, remote access work and communication rise, increase in digital process increase, it has also made people vulnerable to many different types of cyber-attacks such as phishing, malwares and social engineering. It has also resulted in commercial theft of intellectual property. This paper tries to throw light on economic loses that have occurred due to cybercrimes.


Author(s):  
LE Thanh Tam ◽  
Nguyen Minh Chau ◽  
Pham Ngoc Mai ◽  
Ngo Ha Phuong ◽  
Vu Khanh Huyen Tran

The technological revolution 4.0 brings great opportunities, but also cybercrimes to economic sectors, especially to banks. Using secondary data and survey results of 305 bank clients, the main findings of this paper are: (i) there are several types of cybercrimes in the banking sector; (ii) Vietnam is one of the top countries worldwide having hackers and being attacked by hackers, especially the banking sector. Three most common attacks are skimming, hacking and phishing. Number of cybercrime attacks in Vietnam are increasing rapidly over years; (iii) Vietnamese customers are very vulnerable to cybercrime in banking, as more than 58% seem to hear about cybercrimes, and how banks provide services to let them know about their transactions. However, more than 50% do not have any deep knowledge or any measures for preventing cybercrime; (iii) Customers believe in banks, but do not think that banks can deal with cybercrime issues well. They still feel traditional transactions are more secure than e-transactions; (iv) the reasons for high cybercrimes come from commercial banks (low management and human capacity), supporting environment (inadequate), legal framework (not yet strong and strict enough on cybercrimes), and clients (low level of financial literacy). Therefore, several solutions should be carried out, from all stakeholders, for improving the cybersecurity in Vietnamese banks. 


1973 ◽  
Vol 4 (2) ◽  
pp. 269-275
Author(s):  
Jan Gorecki
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document