preview

Social Engineering Techniques Were Used By Phishing Schemes

Better Essays

Prepare a summary of the following:
1. At least four real-life cases, where the social engineering techniques were used including phishing schemes.
2. Summary of social engineering
3. The common schemes that criminals use to obtain personal and corporate information. This should be subsection into
• Electronic Communications
• Personal Communication
4. The basic protocols and policies that you can implement to avoid these threats. In addition, create a phishing e-mail message to show how dangerous, a trained person can be.
5. Create a two-page report containing a sample phishing e-mail sample message.
There was a case I research that used phishing as a scheme trying to obtain emails and personal information. There is a term used call spear …show more content…

It erased $136.5 billion from the value of the S&P 500. It was in matters of second that it dipped and it was realized that they were infiltrated by a hacker. Just an email that was sent, managed to cause such traumatic events. The company managed to regain their lost back, will most of it. It showed the vulnerability of the company and the ever growing email message phishing scheme’s of e-mail messages.
The next kind of phishing happened in March, an email the mimicking a South Korean Bank was sent out. When the email was opened a cyber attack wiped the hard drives of computers of banks and broadcasting companies all in South Korea. It was nine email that came across to banks that said to reboot and when the individuals that did it rest their computers and when it came back on the software was not there. It just wiped their program on March 20, 2013 at 2pm it was a logic bomb.
The next crime I found that was phishing was when a massive email was sent out to warn employees against phishing schemes. It was about paychecks and the way they are going to get paid and a fee that is suppose to come out of their accounts. Than at the end warned people about a false company using Intuit name and that they are a trademarked company with their own logos and seals. Yet it was a phishing scheme within a warning. It does not say what was affected but that it was noted and taking into caution that even warnings about certain scams are also phishing

Get Access