Saturday, January 4, 2020

The Problems Of Social Engineering - 1343 Words

Another way in which social engineering can take place is to have details of the clients and then access the system of Amazon posing as clients. One of the requirements in order to have access to customer information. Amazon have not been serious in screening customers and will not be able to know if the customers are who they say they are in real life. It is hard to have an understanding of the data and information about the data and the issues that are associated with the data. Another social engineering technique that can be used is the posing of an attacker/hacker as a publisher. A hacker/attacker will pose as an author through accessing and publisher information. After accessing this information, they will be able to pose as authors†¦show more content†¦It is important to have clients and customers update their personal information most of the time. By having clients change their personal information, they will be able to protect the data that they have in their ways of living. Another way of thwarting social engineering is to avoid having the customers reveal how they infrastructure of the company has been done and structured. It is through concealing the way the customers get to the system. There is also a need to have crushing of information that will reveal the data and information of the clients in the way they will have access the data and information on the website of the company. One of the measures that can be done in order to have secure and data protections is to destroy customer’s information that are no longer used. It is important to have ways in which the data will be protected and enhanced in terms of protection. The data that is found in the data environment is to have data protection so that the data will be protected in the end. Another countermeasure that should be done is to have regular updates on their data infrastructure. This is one of the ways in which the holes and security lapses will be assured in the end. It is important to have ways in which the data will be protected and enhanced in the end so that there will be secure ways in which they will be accessed and enhanced in the end. Another countermeasure is to ensure that there is to have surprise inspections of the profiles of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.