It is the act of obtaining or attempting to obtain secure data by leading an individual into revealing secure information. Social Engineering is successful because its victims will reveal their information to someone whom pretended to be someone they trust or representing to be someone they trust. The victims of social engineering are tricked into releasing information that they do not realize will be used to attack a computer network.
b). Salami Slicing
A technique which successfully used by criminal IT staff to acquire a large sums of money, by collecting a very small amounts. It is mostly applied on Foreign Exchange business where a large amount of transaction will takes part. Salami Slicing will round down the amount and transfer the small amount of money to different and hidden account. This approach can only work well with systems that handling a huge numbers of transactions and where the amount will not be noticed.
c). Trojan Horse
A software that masquerades as a positive application. Trojan Horses do not duplicate themselves but can be destructive. Trojan Horse is a program that claims to rid your computer viruses, but in other hand, they are actually introducing viruses onto your computer.
d). Distributed Denial of Service
A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. A hacker begins by exploiting a vulnerability in one computer system and making it the DDoS master. It is from the master system that the intruder communicates with other systems that can be compromised. The intruder loads cracking tools available on the internet on several compromised systems. With a single command, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. This is how the denial of service caused.
e). Sniffer
A sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet. Even encapsulated (tunneled) packets can be broken open and read unless they are encrypted and the attacker does not have access to the key. Using a sniffer, an attacker can analyze your network and gain information to eventually cause your network to crash or to become corrupted. Besides, it will also read the communication between you and your receiver.
f). IP Spoofing
Most networks and operating systems use the IP address of a computer to identify a valid entity. In certain cases, it is possible for an IP address to be falsely assumed— identity spoofing. An attacker might also use special programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet. After gaining access to the network with a valid IP address, the attacker can modify, reroute, or delete your data. The attacker can also conduct other types of attacks, as described in the following sections.
g).Brute Force Attack
A brute force attack consists of trying every possible code, combination, or password until you find the right one.
The difficulty of a brute force attack depends on several factors, such as:
- How long can the key be?
- How many possible values can each component of the key have?
- How long will it take to attempt each key?
- Is there a mechanism which will lock the attacker out after a number of failed attempts?
As an example, imagine a system which only allows 4 digit PIN codes. This means that there are a maximum of 10,000 possible PIN combinations.
h). Shoulder Surfing
Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is an effective way to get information in crowded places because it's relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done long distance with the aid of binoculars or other vision-enhancing devices. To prevent shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand.
i). Sabotage
Employees are most familiar with their employer's computers and applications, including knowing what actions might cause the most damage, mischief, or sabotage. The downsizing of organizations in both the public and private sectors has created a group of individuals with organizational knowledge, who may retain potential system access (e.g., if system accounts are not deleted in a timely manner). The number of incidents of employee sabotage is believed to be much smaller than the instances of theft, but the cost of such incidents can be quite high.
Common examples of computer-related employee sabotage include:- destroying hardware or facilities,
- planting logic bombs that destroy
- programs or data,
- entering data incorrectly,
- "crashing" systems,
- deleting data,
- holding data hostage, and
- changing data
Electromagnetic Interference (or EMI, also called Radio Frequency Interference or RFI) is a disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source. The disturbance may interrupt, obstruct, or otherwise degrade or limit the effective performance of the circuit. The source may be any object, artificial or natural, that carries rapidly changing electrical currents, such as an electrical circuit, the Sun or the Northern Lights.