Computer Science Social Engineering

BY IN CS - Computer Security Comments Off on Computer Science Social Engineering , ,

COMPUTER SECURITY ASSIGNMENT! Construct a program that will be displaying some messages in your friend’s computer. Please note that please conduct a research first before put your plan to your task list, to make sure that it is doable or not. The Task List could be as follows: * The tool/ software used: Visual Basic.

CONTINUE READING …

Computer Security: Social Engineering (Daryan)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Daryan) , ,

The subject inserted the flash drive containing the program. The program is masked as IB Physics Past Paper May 2015.doc. The subject deliberately ran the program. When the program ran, the antivirus rejected the program to work but then the antivirus was disabled manually and then the program ran. The program made a copy of

CONTINUE READING …

Computer Security: Social Engineering (ChinHeng)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (ChinHeng) , ,

My victim is Ansell. At first, I lied to him about a “new game database,” that the program could search for the first until the last game, for free. Not only games, it can search for cheats, mods, maps, and any other properties that the game must have. He looks so happy that he received

CONTINUE READING …

Computer Security: Social Engineering (Kevin)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Kevin) , ,

Program detail (Final): This program is a program that will run automatically when windows starts up. The program has 2 files, one is the executable file, and one is a folder containing all the pictures and sound. Program name: Kaelproject.exe, folder name: Randomimage. The program will check if the program is already running. If it

CONTINUE READING …

Computer Security: Social Engineering (Daniel)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Daniel) , ,

First, I tried to convince the target that I would give him the photo of a kid. The target was extremely obsessed by the look of the kid. So I thought his photos would be very attractive for the target. I decided to make an application that acted as a photo viewer. The photo viewer

CONTINUE READING …

Computer Security: Social Engineering (Clark)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Clark) , ,

On the 12th of May 2015, I used my program to my good friend, Igna. The program that I made is an annoying virus that pops out a mathematical question every hour after the computer is turned on. The program spread is through flashdrive, but it have to be run manually through the flashdrive. The

CONTINUE READING …

Computer Security: Social Engineering (Grace)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Grace) , ,

Yesterday night I send my virus to two of my friend’s email then I inform them to check it by saying that it’s my experiment for my school project. Then when they check it they thought that its just their computer cant open my file then they just click run. When they ran into my

CONTINUE READING …

Computer Security: Social Engineering (Albert)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Albert) , ,

Part 3 : Scenario The scenario for the social enginnering is as follows: Ask help from a friend which is in the same class of the target (Wilson) I give Wilson a flashdisk containing the program. He then insert the flashdisk containing the program, and copy it into the desktop during school hours. He then

CONTINUE READING …

Computer Security Issues

BY IN CS - Computer Security Comments Off on Computer Security Issues

Worms: fast spreading using wide network (internet), sometimes uncontrollable Trojan Horse: a software that hides inside another software, need user interaction to make it active. mostly give destructive impact! Places that usually used by virus to defend itself: Registry Task Manager Configuration Files (WIN.INI, SYSTEM.INI, MSConfig etc) System Directories Social Engineering: Send a copy of “important”

CONTINUE READING …