Critical Information Literacy Essay

Total Length: 280 words ( 1 double-spaced pages)

Total Sources: 2

Cybercrime how to defend against social engineering

There are several attack vectors for cybercriminals, which means that people need to have an equal number or more of ways to defend these attacks. Social engineering is one tactic, and it works in part because the attackers essentially bypass formal defenses such as firewalls or antivirus. Instead, social engineering is “the art of exploiting the human flaws to achieve a malicious objective” (Breda, Barbosa & Morais, 2017). A typical social engineering attack would be a phishing scam, but others would include hackers tricking people into providing information, which is then used against them (Kaspersky, 2020).

Protecting personal information online where social engineering attacks are concerned means training people in how social engineering attacks work, what the attackers need you to do, and how to spot typical scams.
This training can often be done with courses, or online, and many security providers offer these services.

Many social engineering attempts are seeking to gain passwords, so it is always valuable to use a password manager, where the actual password is encoded, or otherwise does not need to be typed in. With a password manager, this limits the risk of social engineering techniques like shoulder surfing.

Training is the most important line of defense in cybersecurity. The hard defenses like firewalls and antivirus protection can be bypassed by innovative attackers, but training against cyberattacks will limit their impact. By protecting passwords, using strong passwords, and using two-factor authentication it is possible to defend against social engineering cyberattacks, however they may come.
.....

     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Critical Information Literacy" (2020, April 15) Retrieved May 18, 2024, from
https://www.aceyourpaper.com/essays/critical-information-literacy-2175080

Latest MLA Format (8th edition)

Copy Reference
"Critical Information Literacy" 15 April 2020. Web.18 May. 2024. <
https://www.aceyourpaper.com/essays/critical-information-literacy-2175080>

Latest Chicago Format (16th edition)

Copy Reference
"Critical Information Literacy", 15 April 2020, Accessed.18 May. 2024,
https://www.aceyourpaper.com/essays/critical-information-literacy-2175080