The aspects of social engineering are thoroughly investigated from a different perspective when it comes to users. Some users think that they are officially secured after entering their username and password into the system, but in reality they are not. Several users are malicious and use various techniques to deceive other people such as downloading illegal software into a workplace computer and leaking information. Those users who do not have stronger passwords were more likely to have their information to be stolen by a criminal. These issues range from emails and telephones to face-to-face interactions, which make everything hard to catch potential attacks. All of these issues have to be prevented through certain methods so that other users do not fall into certain traps.
Keywords: illegal, malicious, users, methods, software, attacks.
…show more content…
Unfortunately, there are some users who are not IT individual can break into the system in many ways are referred to as computer hackers. These people will perform certain tasks such as , downloading or uploading malicious software into other computers, send emails, and other deceptive methods. These problems will not only cause the system to crash, but it will also infect the computer with a virus. Even though users may think once they enter their username and password, everything works perfectly. However, the user may realize that their system has been under attack by a dangerous criminal. These challenges fall under the category known as social engineering. All attacks cannot be eliminated right away, but there are several strategies to counter social engineering attacks as