Wednesday, May 8, 2019

CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay

CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING SOCIAL engineering FOR CYBER ATTACKS - Essay ExampleIn their actions, hackers in the contemporary society use the most sophisticated of malware to fervour information brasss and networks in ways never seen before. Nevertheless, the initial subprogram of social engineering in these attacks is eye and cannot be overlooked due to the technologies used. Social engineering is hackers equivalent of a con or a trick, which makes the target people or systems to think someone, something or an action, is safe, trustworthy and familiar while in candor it is not (Kiountouzis & Kokolakis, 2011). The most common of social engineering con tricks often involve the hacker direct an e-mail to the target person or system. This e-mail if first tailored so that it appears to have add from a trustworthy sender. However, these con e-mails often contain links that when opened or clicked, directs a calculator to a malware, which is in t urn shootloaded by the user on the target computer or system (Kiountouzis & Kokolakis, 2011). At this stage, the hacker employs the Remote Access Tool (RAT) to search through the computer network and/or infect other computers or networks. Social engineering is today exploited by hackers to bring down or access others computer/information networks and obtain information in the comfort of their homes provided they are certainly their target leave alone most likely be sitting at their computers (Kiountouzis & Kokolakis, 2011). ... This paper explores the various types of cyber and security threats to which information and technology companies and there ISs are exposed and the role of employee alertness in averting these threats, especially those originating from hackers using social engineering. In this regard, the paper is a case study of an information security develop at one of the most renown IT security firms in the United States, the RSA. After addressing how RSA responded t o the breach, the paper explores the role of employee alertness in averting such threats in the future. However, it is of the essence to first have a widely distributed understanding of the various techniques that hackers use to breach information security systems and obtain information illegally. The Protection motif Theory This paper will employ the protection motivation theory to explain the role and grandness of employee alertness in assisting IS firms in detecting and preventing security breaches via social engineering techniques. According to this theory employees will always protect themselves based on certain core factors. These factors include but are not limited to the probability of the occurrence of a security threat or breach, the suspected or evaluate severity of the threat, the vulnerability of the possible victims, the efficacy of the response/preventive mechanisms or behaviours. The motivation to protect oneself and holding emanates from the evaluation of threat s as well as the ability to cope with the threats or its effects. In the threat judging context, employees of IS and IT companies are expected to be able to appraise the severity of possible social engineering threats and the sincerity of the situation once it occurs. On the other hand, the coping

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.