International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 78    Submit Your Rating     Cite This   Download        Certificate

REVERSE SOCIAL ENGINEERING AND ITS IMPACT ON ORGANIZATION’S DIGITAL DATA

    1 Author(s):  PREETI JAIN

Vol -  3, Issue- 1 ,         Page(s) : 194 - 200  (2012 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

In today’s information-age, an organization’s dependence on cyberspace is becoming an increasingly important aspect of organizational security. As different organizations’infrastructure is interconnected in cyberspace, the level of risk to organization’s security has increased dramatically.Fromfaster development of new technologies and products to global connectivity, collaboration and innovation, the benefits presented by cyberspace are immense. However, as fast as business innovates, cybercrime does too – becoming increasingly sophisticated, organized and professional – driven by potentially huge financial rewards. Regardless of the measures an organization adopts to protect itself, it is liable to be breached. Disconnecting from cyberspace is not an option, so to mitigate the cybercrime risk, organizations need to build resilience to ensure that they respond and recover from an attack as rapidly and efficiently as possible, to limit the financial, operational and business impact.

1. Hoffman, Thomas. “Premium Protection: Security Breaches. Viruses. Should you amend your IT insurance plan to cover such risks?” Computerworld March 31, 2003. URL: http://www.computerworld.com/securitytopics/security/story/0,10801,79794,0 0.html (Aug 12, 2003)
2. Harrison, Ann. “Survey: Cybercrime Cost Firms $266M in 1999.” Computerworld March 27, 2000 URL: http://www.computerworld.com/news/2000/story/0,11280,44243,00.html (Aug 12, 2003).
3. National Security Institute (www.nsi.org). Employee Information Awareness Service. August 2003.URL: http://nsi.org/SSWebSite/TheService.html (Aug 12, 2003).
4. Mitnick, Kevin. “How to Hack People.” BBC NewsOnline, October 14, 2002. URL: http://news.bbc.co.uk/1/hi/technology/2320121.stm (Aug 12, 2003).
5. Winkler, Ira S. and Dealy, Brian. “Information Security Technology? …Don’t Rely on It.  A Case Study in Social Engineering.” URL: http://www.usenix.org/publications/library/proceedings/security95/winkler.html (Aug 12, 2003).
6. Stevens, George. “Enhancing Defenses against Social Engineering”. GIAC Practical Repository. URL: http://www.giac.org/practical/gsec/George_Stevens_GSEC.pdf (Aug 12, 2003).
7. Mitnick, K. D. (2002). The Art of Deception: Controlling the Human Element of Security. New York, New York: Wiley Publishing. 
8. Long, J. (2008). No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Rockland, MA: Syngress Publishing. 
9. Graves, K. (2007). CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50. Indianapolis, Indiana: Sybex Publishing.
10. Rogers, M. K. and Seigfried,  K. (2004), “The future of computer forensics: a needs analysis survey”, Computers & Security, 23(1), pp. 12--16.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details