Page 73 - index
P. 73







their knowledge. All the data available there in the PC like data in Hard Disk, Browsing History,
and Saved Passwords etc. They all get compromised with the attacker within just minutes.



5. On-Line Attack

This attack involves spamming emails to thousands of people with malicious code inside the
attachment and as the user open up the mail, these attachments pop out and gets installed in
the victim’s PC without any knowledge and gives a backtrack record to the attacker timely.

These attachments can be keyloggers, viruses, malwares, worms etc, sometimes, attacker
sends a registration form lobbing to create an account and as mostly users have common or
same passwords to almost every account, attacker tries the same password to get access.

If there are Cyber Criminals who attacks and makes the web unsecure so in the counter there
are Cyber Security Experts who are working as an Army to secure everything. Ethical Hackers
are working day and night to cope up with cyber crime but in Social Engineering they are also
helpless, as this attack doesn’t beach any technical security, it rifts the human mind and takes
up the benefit of human nature.


In order to cope up with this most dangerous attack of Social Engineering, there is a need to
learn what the countermeasures for this attack are.




Countermeasures for Social Engineering Attacks

I. Everyone should know the basic of social engineering and should be aware of its
counter effects.


II. Every company should have training sessions by Cyber Security Experts on aftermath of
social engineering.

III. Employees need to have proper authentication of other before handling over any
confidential data.

IV. In case of any doubt, employee should be trained or prepared to politely refuse to share
data.

V. Proper security protocols, policies and procedures should be there in any company.

VI. Individuals should never reply for the mails, SMSs or phone calls which ask for your
personal information or passwords of your bank instead always contact your branch
head in this regard.

VII. Always be aware of URLs or Web Links while working on internet, it should not be a
phishing page.

73 Cyber Warnings E-Magazine – July 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   68   69   70   71   72   73   74   75   76   77   78