SUbject Security in Computing Essay Questions 1 Explain the

SUbject: Security in Computing

Essay Questions:

1. Explain the difference between social engineering and reverse social engineering.

2. Describe the process of piggybacking. Is this common attack technique possible in your work or school environment?

3. How might shoulder surfing be a threat in your school or work environment? What can be done to make this sort of activity more difficult?

Solution

1.Difference between Social Engineering and Reverse social Engineering

Social Engineering:- It is a kind of cyber attack by exploiting human psychology, rather then by breaking in or using technical Hacking technique.

Reverse Social Engineering;- Here in this case attacker doesnot himself initiate contact with the victim. Rather, the victim is tricked into contcting the attacker herself.

2.Process of piggybacking:-

Definition:- It is an unauthorized acess of a Wireless LAN.

Process:-

a.)Get into the range of Wi-Fi hotspot\'s singnal.

b.)Select your chosen network from the option presented.

3.)Shoulder surfing:- This is another kind of security threat, where some person look over the shoulders to gain acess to the secret information.

Shoulder surfing as a threat:

Thorough shoulder surfing someone can gain acess to the following secret information:-

a.) Password of your e-mail password.

b.)Credit/Debit card PIN. etc.

To make shoulder surfing more difficult several preventive method can be applied and few of them are as follows:-

a.)Shield your keypad from view by using one\'s hand.

b.)by using special privacy screen shield.

c.)by angling your screen away from the gazes of other people.

SUbject: Security in Computing Essay Questions: 1. Explain the difference between social engineering and reverse social engineering. 2. Describe the process of

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site