StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Elecitation and pretexting - Essay Example

Cite this document
Summary
This takes place during a very normal and innocent communication when social engineers seek to obtain some information. The engineers use their…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Elecitation and pretexting
Read Text Preview

Extract of sample "Elecitation and pretexting"

Elicitation and pretexting Introduction Elicitation refers to the process of extracting as well as gathering informationfrom someone through the use of technology. This takes place during a very normal and innocent communication when social engineers seek to obtain some information. The engineers use their conversational skills as well as tactics so as to encourage the targeted people to provide in-depth information. The tactics include assumptive questions, volunteering information, expression of mutual interest as well as appealing to the ego of their target.

On the other hand, pretexting is the practice of an individual presenting themselves to be someone else so that they can obtain some private information. It is the use of publicly available information to in order to creates ones new identity and using it to acquire information needed to convince their target to take a specific action. Positive attributes of elicitation and pretextingThe tools of social engineering can be used to detect criminal activities by tracing the conversations of the suspects before they engage in attacks.

Elicitation has aided in the fight against global challenges such as terrorism through the tracking of conversations using modern communication gadgets. It can be used to get some vital information that may lead to the hideouts of criminals. The tool is used by politicians and other leaders to make inroads into the camps of opponents for safeguarding the nation. Pretexting can be used to gain vital information on the operations of illegal business ventures and bringing them to the public for legal measures to be undertaken.

Intelligence services adopt the use of elicitation to track down hackers who use similar techniques in propagating criminal activities (Hadnagy, 56-109). Work CitedHadnagy, Christopher. Social Engineering: The Art of Human Hacking. , 2011. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Elecitation and pretexting Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Elecitation and pretexting Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1672013-elecitation-and-pretexting
(Elecitation and Pretexting Essay Example | Topics and Well Written Essays - 250 Words)
Elecitation and Pretexting Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1672013-elecitation-and-pretexting.
“Elecitation and Pretexting Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1672013-elecitation-and-pretexting.
  • Cited: 0 times

CHECK THESE SAMPLES OF Elecitation and pretexting

Software Quality Assurance Capability Level 2 and Work Products for Requirements Elicitation Process

This paper "Software Quality Assurance Capability Level 2 and Work Products for Requirements Elicitation Process" analysis the work products relevant to the assessment of capability level 2 in the requirements elicitation process to demonstrate complete achievement of the defined outcomes for the requirements elicitation process....
8 Pages (2000 words) Case Study

Anatomy and Physiology 1

A coroner was unable to remove the drug vial clutched in a suicide victim's hand.... This is because of rigor mortis.... Rigor mortis is stiffening of the body after death due to disappearance of adenosine triphosphate (ATP) from the muscle.... The muscles of the body become rigid… In order for muscle to contract, energy is needed and ATP is the major source....
2 Pages (500 words) Essay

Unjustified Questioning and Searches

It specifies that criminal courts are the core of the criminal justice system and have the primary missions of providing authorities for regulating crime,… It acts to protect the weak from being harassed by the strong as it regard all individuals as equal (equality before the law). The fourth amendment Unjustified questioning and searches were common and caused tension in the pre-revolutionary America....
2 Pages (500 words) Essay

Information Security Management

The writer of the paper "Information Security Management" gives detailed information about the Systems Security Engineering Capability Maturity Model (SSE-CMM) security management framework considering and analyzing the diagram giving at the beginning of the paper.... hellip; a) Outline and explain how the GhostNet case study may have seen impacts affecting each one of the components in the framework diagram above....
1 Pages (250 words) Assignment

The Nature and Effect of Superbug H1N1

This work called "The Nature and Effect of Superbug H1N1" describes influenza as an infection caused by a virus of the same name.... The author outlines the development of heterotypic vaccines, a new era in large scale vaccine production, in which recombinant technology is used instead of using egg-based vaccines....
6 Pages (1500 words) Coursework

Changes Related to Changes in the Electrical Activity of the Brain

The paper "Changes Related to Changes in the Electrical Activity of the Brain" discussed several questions related to the differences in the types of dreams, functions that Freud attribute to dreams, and functions of dreams accordingly to views of modern researchers.... hellip; Daydreams are different from other types of dreams due to the fact that they occur when one is awake....
6 Pages (1500 words) Assignment

Magnetic Levitation

The writer of the paper “Magnetic Levitation” states that it has a lot to offer in terms of economic development, time-saving, and environmental conservation as the cost of implementing and maintenance of systems applying this technology is cheap thus should be encouraged and promoted....
9 Pages (2250 words) Term Paper

Reporting Nonsignificant Findings

This essay "Reporting Nonsignificant Findings" discusses statistical comparisons using declarations of statistical significance or nonsignificance, available literature demonstrates that such results should be presented in an understandable manner as they influence decision making.... hellip; Research is clear that nonsignificant findings should be presented through the use of p-values, standard deviations, and confidence intervals (Hoem, 2008), and also by employing a post hoc statistical power and sample size analysis to show that the study was responsive enough to detect an important effect or outcome (Derr & Goldsmith, 2003)....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us