Copyright Goodheart-Willcox Co., Inc. 50 Principles of Cybersecurity Quick Look 2.2.4 Continued 7. Click on a set of cookies to see the individual cookies. Click an individual cookie to see data about it, including when it will expire. For some cookies, you will not be able to read the content as some content is written in JavaScript. 8. Close Chrome, and then relaunch it. 9. Display the cookies, and fi lter for AOL cookies. Are there any cookies still present from AOL? Explain why or why not. Social Engineering Social engineering is a hacker using social tools and techniques to obtain information. Social tools include methods that provide personal information on individuals. This could be through searching social media platforms such as Face- book and Instagram, publicly accessible websites, or falling prey to conversational techniques in which the victim unknowingly reveals personal information. Once data about a person are collected, the hacker can use that information to imper- sonate or target the individual. By impersonating the individual, that hacker can gain access to systems. What is interesting about this type of attack is it is often indirectly applied. The victim is not always the one to whom social engineering is applied. For example, a hacker could target Jason in order to obtain information about his boss. The boss is the victim, but social engineering is applied to Jason. An excellent case of social engineering involves the attack against technol- ogy journalist Mat Honan, who writes for Wired magazine. A hacker wanted his Twitter handle @Mat. Due to some vulnerabilities in how Honan created and used passwords and poor identity practices at Apple and Amazon, Honan lost more than his Twitter account. He also lost all data on his MacBook, iPhone, and iCloud backup. This included personal fi les and irreplaceable photos. Through vulner- abilities, the hacker obtained Honan’s e-mail address, billing address, and the last four numbers of the credit card on fi le. Using this information, the hacker essen- tially took digital possession of Honan’s accounts. Through iCloud, the hacker also took control of Honan’s Apple devices. All of this took place within minutes. You can read Honan’s story on the Wired website (www.wired.com). Use a search engine, and enter the search phrase mat honan apple amazon hack. Then, choose the article on the Wired website from the returned results. CompTIA Security+ 1.2 MTA Security Fundamentals 1.1 Third-Party Cookies The Wall Street Journal website has a short video that covers the use of cookies, specifically third-party cookies and behavioral tracking. Use a search engine, and search for wall street journal how advertisers use internet cookies to track you. Then, select and view the video from www.wsj.com entitled How Advertisers Use Internet Cookies to Track You. Behavioral tracking is monitoring what you do online. This is done site-to-site through third-party cookies. Advertisers often use third-party cookies to develop a trail of sites you have visited. Some companies are even using flash cookies to store information that is not deleted when or if you delete cookies. Is it ethical for companies to engage in behavioral tracking? Should it be regulated by the government? Defend your thoughts. Ethical Issue
Previous Page Next Page