This website uses cookies to ensure you have the best experience. Learn more

Social Engineering Essay

2257 words - 10 pages

Social Engineering Attacks and Counter intelligence
Brian Nance

CIS 502 Theories of Security Management
Strayer University

Prof. (Dr.) Gideon Nwatu
May, 5, 2013

Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs
“Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures”. (Rouse, 2006) Social engineering is a con game in where a person breaks into a computer network in the ...view middle of the document...

Most nations have a government agency which supervises counterintelligence, and often several intelligence agencies have a counterintelligence branch which is separate from their regular operations”. (Smith, 2013) The main purpose of counterintelligence is to keep potentially sensitive information out of enemy hands. Counterintelligence agents coordinate with security agents to ensure that information is secured and protected.
According to (Smith, 2013), counterintelligence agencies gather information on foreign and enemy intelligence agencies, looking at their structures, methods of working, and known operatives. This information is used to exploit vulnerabilities and security holes on the enemy's side while protecting vital information. These agencies also works to prevent subversion, assassination, sabotage, and other threats to information security and national security, using information gathered from enemy organizations to stay ahead of such threats.
In regards to the leaked Afghan War Diary and Iraq War Logs released by WikiLeaks is how does social engineering and counterintelligences potential implications to national security. Before delving into WikiLeaks’ release of the Afghan War Diary and Iraq War Logs in July and October 2010 and potential implications to national security, it is important to understand what is WikiLeaks. WikiLeaks is an independent, non-profit online media organization that publishes submissions of otherwise unavailable documents from anonymous sources. “The organization’s self-stated mandate explains its primary interests are oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to those in the west who wish to reveal unethical behavior in their own governments and corporations”. (Rouse, 2010)
WikiLeaks allows any user to add or edit the submissions of restricted or censored material of political, ethical, diplomatic or historical significance. The identity of the source is protected. Many followers of WikiLeaks praise the organization for its promotion of free speech, transparency and open information. Critics of WikiLeaks assert that documents they make available may have been acquired illegally and may be published without adequate fact-checking. It is interesting to note that WikiLeaks’ spokesperson, Julian Assange is an internet activist and hacker.
WikiLeaks website in itself does not fit the classic term of social engineering, but the way in which it was used regarding the release of the Afghan War Diary and Iraq War Logs was. It is the belief that WikiLeaks’ platform of promoting free speech, transparency and open information regarding unethical behavior by governments and corporations appeals to those individuals who may feel disenfranchised or find their values in conflict with their government or organization such as in the case of the US Army Soldier who released documents to WikiLeaks.

Other Papers Like Social Engineering

Genetic Engineering Essay

1957 words - 8 pages develop into the creation of enhanced humans. The roles of religion will be discussed as well as the social implications. Research was conducted to determine the religious, ethical, and sociological issues that could affect the development of the human race. This research also aids in the conclusion that genetic engineering for the purpose of designer babies is not good for the human race or society as a whole. Genetic Engineering: Destroying

Genetic Engineering Essay

791 words - 4 pages ¡§Although genetic engineering appears to offer many solutions to individual and social needs, it also has many disadvantages which clearly outweigh the advantages.¡¨ The question of genetic engineering involves a wide range of perspectives including religious issues and moral concerns. Genetic engineering holds the key to many health benefits, breakthroughs in medication and furthering our understanding of DNA. Genetic

Genetic Engineering

8761 words - 36 pages diligence on the part of the individual” (p.75). This statement is at the crux of the issue of the moral and ethical implications of the use of genetic engineering. All of these issues and where the public, government and corporations stand on the issues are based on the social and moral issues they have learned to live their life by. The mindset of people born in the United States would be different than that of someone raised in communist China

Engineering Ethics

1679 words - 7 pages kind of "unwritten rules», but in process of expansion of sphere of social consequences of engineering activity, its complications and misbalance there is a necessity for specially developed and accurately formulated ethical codes. They, as a rule, correlate both with the legal legislation, and with administrative statutory acts, but appreciably reflect specificity of this or that engineering community, being public regulators of interaction of its

Engineering Managemnet

998 words - 4 pages systems in all the real world applications. After working for 17 months as technical sales engineer with Arrow Electronics where I supported many embedded clients in different projects my zeal to advance in embedded systems increased. I want to pursue an MS degree in the field Electrical and Electronics Engineering with specialisation in embedded systems which will help to realise my goal to work as a design engineer and take embedded systems to

Engineering Mngt

2446 words - 10 pages Homework 1 1. Engineering and management are differentiated in this essay with their definitions followed by an example. According to (Steven Cerri, 2008, P 16-17) the field of Engineering involves an attempt to bring down the ambiguity and uncertainty of any complex situation. Whereas the field of management pulls out the number of different possible ways that yields an output out of the given complex situation. The definitions can be

Genetic Engineering 3

2087 words - 9 pages , In reviewing the literature genetic engineering needs to be banned because of the social, religious, ethical, and legal implications. The first step to understanding genetic engineering is to know the start of its creation. Genetics achieved its first foothold on the secrets of nature's evolutionary process, when an Austrian Monk named Gregor Mendel developed the basics of how genetics work. Using this, scientist studied the

Computer Hardware Engineering

1457 words - 6 pages Computer Hardware Engineering Computer hardware engineers research, develop, and test computer systems and components such as processors, circuit boards, memory devices, and many more (Bureau of Labor Statistics). They design new computer hardware, create blueprints of computer equipment to be built. Test the completed models of the computer hardware that they design. Update existing equipment so that it will work will new software. Oversee


1279 words - 6 pages an optimum solution for society in terms of overall costs and efficiency. It is tempting to think that a combination of extra factors that would accompany any real city, with social relationships, governments, competing urban centers, wars, etc., would be a necessary ingredient to shape these individuals into the most efficient pattern. An alternate explanation, which von Thünen espoused, is that this spatial optimization can occur spontaneously


3866 words - 16 pages Ubuntu is part social and part economic: free software, available to everybody on the same terms, and funded through a portfolio of services provided by Canonical. Process Management * The Linux terminal has a number of useful commands that can display running processes, kill them, and change their priority level. This post lists the classic, traditional commands, as well as some more useful, modern ones. * Many of the commands here


551 words - 3 pages Prelab: 1. Batteries are made by the difference in the electronegativity of different metals. Electrons can flow spontaneously between metals that give off electrons easier to metals that are less likely to give off electrons. There is a substance between these metals that allow charge to flow (salt bridge) so net charge doesn’t build up and “turn off” the battery. Draw a diagram (use your text) of an alkaline battery showing the + terminal

Related Essays

Social Engineering Essay

649 words - 3 pages Social Engineering Social engineering has become the most popular method of compromising the security of personal data. The successful use of Social Engineering techniques has provided attackers and hackers the ability to breach computer systems and gain access to sensitive data. Many computer hackers have found that it is easier to trick somebody into giving his or her password than to carry out an elaborate hacking attempt. Social

Social Engineering Essay

594 words - 3 pages When it comes to technology, it’s not perfect. One may say the reason being is because it’s man-made. Therefore, when it comes to hacking electronics, it can be easy depending on how well the hacker can spot the loop holes within the technology. However, hacking doesn’t involve technology. Social engineering would be a prime example. Social engineering is a process of manipulation to where one will impersonate value of authority in order to

Social Engineering Attacks And Counterintelligence Essay

1133 words - 5 pages Case Study 2: Social Engineering Attacks and Counterintelligence Marilyn Washington Dr. Gideon U. Nwatu CIS 502 November 3, 2013 Abstract The topic of this paper is “Social Engineering Attacks and Counterintelligence.” Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest

Security Recommendations To Prevent Social Engineering Attacks

362 words - 2 pages Security Recommendations To Prevent Social Engineering Attacks A social engineering attack is a non technical attack that attacks the mindset of the victim. An intruder prefers this attack, because the human mindset has more weaknesses than many systems do. There are several implementations that can be used to deter social engineering attacks. The following are list of security recommendations to thwart social engineering attacks that