Provide an example of a social engineering attack.

What will be an ideal response?


An example of a social engineering attack is the so-called Advance Fee Fraud (AFF), which is known internationally as the "4-1-9" fraud (named after a section of the Nigerian penal code). The perpetrators of 4-1-9 schemes often use fictitious companies, such as the Nigerian National Petroleum Company. Alternatively, they may invent other entities, such as a bank, a government agency, or a nongovernmental organization such as a lottery corporation. This scam is notorious for stealing funds from gullible individuals, first by requiring them to send money up-front in order to participate in a proposed money-making venture, and then by charging an endless series of fees. These 4-1-9 schemes have even been linked to kidnapping, extortion, and murder; and they have, according to the United States Secret Service, bilked over $100 million from unsuspecting Americans lured into disclosing personal banking information.

Computer Science & Information Technology

You might also like to view...

Show the student roster (use the format: , in a single column) for each section that Todd Smythe teaches. Identify the section using course number AND section number. (18 rows)

What will be an ideal response?

Computer Science & Information Technology

Type I errors are more dangerous than Type II errors

Indicate whether the statement is true or false.

Computer Science & Information Technology

A system administrator is concerned with employees connecting removable storage to the server to copy sensitive data. Which of the following solutions addresses this concern?

A. Disable write access B. Disable WOL C. Disable TPM D. Disable physical ports

Computer Science & Information Technology

A(n) ____ operation permits an event handler to determine the kind of component that generated an event, and then take a different action for each kind of component.

A. assignment B. instanceof C. cast D. referencing

Computer Science & Information Technology