Describe the method of threat
It is a practice of using non-technical means, usually by communication through phones, which is to attack a target.
How it works?
- By phone
They can pose as employees of the company or organization. They can ask questions to gain the trust of the person, this might include getting the confidential information
- Phishing (most common technique on the internet)
Hacker can get data or information from the website where the user put their information
- Using attachments to email
In this, malware is used to attack users address book and send emails with the file's attached to all of the user's contact
Provide example how it affect a system
When a hacker calls a company to pretends they are from the internal IT department and they will start asking the employee for sensitive information that can help them to gain access to the network.
Describe how to prevent such threat
- Delete any request to personal information or passwords
Delete any request through email that asking for your personal information because no one should be contacting your personal information through email, this is a scam.
- Reject any requests for help or offers of help
This social engineers may request your help with your information or they might also offering to help you (as a technician).
- Set your spam filters to high
- Secure your devices
Install an antivirus software, firewalls and email filters and also set your automatic updates on and only access the secured websites
References:
No comments:
Post a Comment