Thursday, October 31, 2019

W3D 590 perceive people Essay Example | Topics and Well Written Essays - 250 words

W3D 590 perceive people - Essay Example These aspects may render one perceive or view people positively or negatively. They affect the way one senses certain information before showing any impression. Therefore, there are several factors that commonly incite the way we perceive people. The first one is the mood state experienced by a person (Smith, 2013). Moods affects strongly on the way we perceive someone. We are able to think properly or make a positive impression of others when we are happy compared with times when we are depressed. When in undesirable mood, we are most probably going to evaluate others unfavorably than when in a positive mood state. An interviewer will make a good recommendation about a job applicant when his or her mood state is welcoming. The second factor is the attitude of the perceiver towards someone being perceived. The attitude that we have towards others affects the impressions we make on others. For example, if a male interviewer has a negative attitude on female that they are not capable to handle the job given, then his perception of a female job applicant will automatically be affected (Chris & Peter, 2014). The third one is the interests we have. Our attention, focus mostly appears to be affected by our interests which differ from one individual to the other. What one notices in situation may differ from what the other perceives. Before the interviewer makes any impressions, he or she will consider his or her interest in the job applicant. Self-concept is another factor that affects our thinking over others.Picking up traits in others will depend on our self-concept, one with a positive self-concept will always have positive attributes of others (Collela et al, 2010). Motive also affects the way we perceive. The interviewer who has an ill motive of a job applicant with better papers than him, he feels unsecured of his position. Fearing that the applicant might take his position will affect his perception. Another factor is knowledge,

Tuesday, October 29, 2019

Surface Chemistry Essay Example for Free

Surface Chemistry Essay It is the phenomenon in which a substance is uniformly distributed all over the surface. Difference between adsorption and absorption: Absorption (i) It is the phenomenon in which a substance is uniformly distributed throughout the bulk of the solid. (ii) It is a bulk phenomenon. (iii) The concentration is uniform throughout the bulk of solid. Adsorption (i) The accumulation of molecular species at the surface rather than in the bulk of a solid or liquid is termed as adsorption. (ii) It is a surface phenomenon. (iii) The concentration of adsorbate increases only at the surface of the adsorbent. 7. 8. Sorption: When adsorption and absorption take place simultaneously, it is called sorption. Enthalpy or heat of adsorption: Adsorption generally occurs with release in energy, i. e. , it is exothermic in nature. The enthalpy change for the adsorption of one mole of an adsorbate on the surface of adsorbent is called enthalpy or heat of adsorption. 9. Types of adsorption: Get the Power of Visual Impact on your side Log on to www. topperlearning. com 2 a. Physical adsorption or physisorption: If the adsorbate is held on a surface of adsorbent by weak van der Waals’ forces, the adsorption is called physical adsorption or physisorption. . Chemical adsorption or chemisorption: If the forces holding the adsorbate are as strong as in chemical bonds, the adsorption process is known as chemical adsorption of chemisorption. It is highly specific (ii) It is irreversible (iii) The amount of gas adsorbed is not related to critical temperature of the gas. Physical adsorption (Physisorption) (i) It is non-specific (ii) It is reversible (iii) The amount of gas depends upon nature of gas, i. e. easily liquefiable gases like NH3, CO2, gas adsorbed to greater extent than H2 and He. Higher the critical temperature of gas, more will be the extent of adsorption. (iv) The extent of adsorption increases with increase in surface area, e. g. porous and finely divided metals are good adsorbents. (v) There are weak van der Waals’ forces of attraction between adsorbate and adsorbent. (vi) It has low enthalpy of adsorption (20 – 40 kJ mol-1) (vii) Low temperature is favourable. (viii) No appreciable activation energy is needed. (ix) It forms multimolecular layers. 11. (iv) It also increases with increase in surface area. v) There is strong force of attraction similar to chemical bond. (vi) It has enthalpy hea t of adsorption. High temperature is favourable. (viii) High activation energy is sometimes needed. (ix) It forms unimolecuar layers. Factors affecting adsorption of gases on solids: a. Nature of adsorbate: Physical adsorption is non-specific in nature and therefore every gas gets adsorbed on the surface of any solid to a lesser or greater extent. However, easily liquefiable gases like NH3. HCl, CO2, etc. which have higher critical temperatures are absorbed to greater extent whereas H 2, O2, N2 etc. re adsorbed to lesser extent. The chemical adsorption being highly specific, therefore, a gas gets adsorbed Get the Power of Visual Impact on your side Log on to www. topperlearning. com 3 on specific solid only if it enters into chemical combination with it. b. Nature of adsorbent: Activated carbon, metal oxides like aluminum oxide, silica gel and clay are commonly used adsorbents. They have their specific adsorption properties depending upon pores. c. Specific area of the adsorbent: The greater the spec ific area, more will be the extent of adsorption. That is why porous or finely divided forms of adsorbents adsorb larger quantities of adsorbate. The pores should be large enough to allow the gas molecules to enter. d. Pressure of the gas: Physical adsorption increases with increase in pressure. 12. Adsorption isotherm: The variation in the amount of gas adsorbed by the adsorbent with pressure at constant temperature can be expressed by means of a curve is termed as adsorption isotherm. 13. Freundlich Adsorption isotherm: The relationship between x and m pressure of the gas at constant temperature is called adsorption isotherm and is given by ? k P 1 /n (n ? 1) m Where x- mass of the gas adsorbed on mass m of the adsorbent and the gas at a particular temperature k and n depends upon the nature of gas and the solid x first increases with increase in pressure at low pressure but becomes m independent of pressure at high pressure. Get the Power of Visual Impact on your side Log on to www. topperlearning.

Sunday, October 27, 2019

Case study Del Montes vision

Case study Del Montes vision Brand Del Monte is a 118 year old brand which is synonymous with quality and taste. The brand  originated in the US and is now available all across the globe. Del Monte has branded processed food and beverage products. The Del Monte range include Fruit drinks, Ketchup Sauces, Packaged Fruits and the Italian Range consisting of Pasta, Olive Oil and Olives/Jalapenos and a Culinary range which is aimed at HORECA, Foodservices and QSR industries. Bharti Del Monte Joint Venture Del Monte came to India in 2007 courtesy a joint venture company known a FieldFresh Foods Pvt between Bharti Enterprises and Del Monte Pacific. It sells fresh and processed fruits and vegetables in the domestic as well as international markets, including Europe and the Middle East. Bharti enterprise has interests in telecom, agri business, financial services, retail and manufacturing businesses in India. Del Monte Pacific Ltd, headquartered in Manila, Philippines, is a company engaged in the production, marketing, and distribution of Del Monte products in the select Asian markets. Del Monte has following product lines in India: Sauces, Juices, Italian cuisine and Packaged fruit. The market size of these products approximately Rs 4000 crore and it will grow at 20% per annum and faces competition from players like Nestle, Hindustan Unilever, Dabur, Parle Agro, Pepsi, ITC, Heinz in India. The company has invested Rs 300 crore in a food processing plant at Hosur in Tamil Nadu and in research on fruit and vegetables which will be operational by 2011. It is now selling products in 25 cities in India. Product Lines in India Ketchups and Sauces Del Monte has launched following four variants in this product line in India and they are : Del Monte Tomato Ketchup: Is made from quality tomato paste and secret blend of spices natural fragrant oils. Del Monte Zingo: Is made from of Red chillies, Red Bell Pepper, Garlic and Ginger. It offers sweet and spicy eastern taste to the consumers. Del Monte Twango: Del Monte TWANGO is a tangy and fruity sauce specially aimed at the younger audiences, and brings a twist to the tomato taste with a splash of the goodness Del Monte Tomato Chilli Sauce: Del Monte Tomato Chilli Sauce is made from tomato paste and hint of red chillies it has a pungent and tangy taste. Packaged Fruit Corn Del Monte has launched Pineapple Tidbits, Pineapple slices, Peach halves, Prunes and Fruit Cocktails in India. Italian Range Del Monte has launched Olives, Pasta and Extra Virgin Oil in India. These product lines popularly used by Restaurants, Caterers and consumers are also using these products at home. Fruit Drinks Del Monte has launched 5 variants under the Fruit drinks in 240 ml cans and dispensers. Percentage Share of Different Product Lines The graph given below gives the current percentage share of different product lines in India: Chapter 5: Current Marketing Strategy Chapter Highlights: Target Market Positioning Product Strategy Distribution Strategy Pricing Strategy Promotional Strategy CURRENT MARKETING STRATEGY Target Market: The Indian youth segment residing in Indian cities age 16-25 is Del Montes primary target market. Positioning: Del Monte Fruit Drinks current positioning is delivering Refreshment, convenience and nutritional value to the youth. Product Strategy Del Monte Fruit Drinks have 5 flavours: Pineapple Fruit Drink (with real fruit pulp) Four Seasons Fruit Drink (a delightful mix of guava, pineapple and mango) Pineapple-Orange Fruit Drink Green Apple Fruit Drink Orange Fruit Drink Product Benefits: Del Monte fruit drinks are naturally fat and cholesterol free, they are rich in antioxidants, they are a good source of Vitamin C and Vitamin B1 and do not have any artificial preservatives. Packaging: Del Monte Fruit Drink is selling its juices in aluminium cans of 240 ml and so it possible to have a shelf life of 24 months. Del Monte Fruit Drink has setup dispensers which can dispense 20 cups a minute. Distribution Strategy COMPANY WAREHOUSE DISTRIBUTOR GENERAL TRADE RETAILERS/ WHOLESALERS MODERN TRADE RETAILERS END USER HOTELS RESTAURANTS CATERING B2B MARKET B2C MARKET Del Monte products are sold in B2C and B2B markets: B2B market In the Business to Business Market Del Monte fruit drink cans along with other Del Monte products are sold to and used over 2200 institutions in the HORECA: Hotels/Restaurants/ Catering(Airlines) segments. Restaurants like: Coffee Day Xpress, Dominos, Subway and Barista, and low cost airlines like: Jet Lite, Jet Connect and Indigo. Del Monte has over 70 persons they help the distributors to sell to institutions. B2C Market Del Monte operates in B2C market and these products are available in 25 cities including major cities like Delhi/NCR, Mumbai, Bangalore, Chennai, Hyderabad, Pune and Kolkata. The company has Distributors and Retailers (Modern Trade and General Trade) as its Channel partners. Del Monte has also setup vending machines and dispensers in institutions and tourist spots to reach the end users more effectively. Distributors The company appoints distributors who supply Del Montes product lines (Ketchups Sauces, Italian Range, Fruit Drinks Packaged Fruit Corn) to general trade outlets and to some modern trade outlets in the major cities. Each distributor has approximately 200 -600 retailers under him and the average monthly sales for each distributor is between Rs 250000- Rs 1500000. Del Monte offers a margin of 7% to its distributors. General Trade Retailers/Wholesalers Del Monte supplies products to 30,000 retailers in 25 cities. It supplies to major General Trade Retailers or the Kirana Shops (neighbourhood grocery stores)/Wholesalers in these cities. These retailers/wholesalers get their supply from distributors who take orders on a fortnightly/weekly basis. These shops have an average purchase ticket of Rs 30,000 per month. Modern Trade Retailers Del Monte is supplying its supermarkets, convenient stores (In and Out store at IOCL Petrol pumps) and speciality food stores (Eg: Le Marche) and the company is selling to them directly through its sales force and some of the modern trade outlets are also supplied through distributors. These are organisations purchase their products weekly and their average purchase ticket vary between Rs 20,000 to Rs 2000000. Distribution Penetration Pricing Strategy Del Monte Fruit Drinks are available in 240 ml cans for Rs. 25. The Del Monte fruit drink offered through dispensers is available in 200 ml cups for Rs 20. Promotion Strategy Del Monte has relied on in store promotions for its Fruit Drinks i.e. price discounts, buy one get one offers and promotional material such as posters displays to promote Fruit Drinks in retail outlets. Del Monte launched Legend Brigade to popularise the range of Del Monte fruit drinks in pineapple, four seasons, pineapple-orange and the newly-launched green apple and orange flavours. This activation will travel to metros and mini-metros where the winner will receive a custom-made bike worth Rs 200,000. Del Monte has also launched an online biker game is on at its micro site, www.worldfoody.com to promote thrill of biking.

Friday, October 25, 2019

Thomas Mores Utopia Essay -- European History

Throughout Thomas More's Utopia, he is able to successfully criticize many of the political, social, and economic ways of the time. His critique of feudalism and capitalism would eventually come back to haunt him, but would remain etched in stone forever. On July 6, 1535, by demand of King Henry VIII, More was beheaded for treason. His last words stood as his ultimate feeling about royalty in the 15th and 16th centuries, "The King's good servant, but God's first." Throughout his life, More spoke his beliefs about feudalism, capitalism, and his ideals of Utopia; More was a thinker, good friend of Erasmus, and although many critics take Utopia as a blueprint for society, in many instances he encourages thought, a critical part of the renaissance that does not necessarily conform to society's own beliefs. Before any conclusions can be made about More's writings, one must know of his disagreements with both King Henry VII and Henry VIII, even following his faithfulness. More was a statesman, a scholar, a writer, and at one time, a Monk. Many of his ideals, including his socialistic ones followed behind Pythagoras, Plato, but a true influence in his life was Desiderius Erasmus. Beginning in 1499, Erasmus visited England, beginning a friendship and intellectual correspondence, translating Latin works, among other things. Erasmus' Praise of Folly, written in 1509 is dedicated to More. One of his first proposals in Parliament was to minimize appropriation for Henry VII; as one could understand, he did not take kindly to More's suggestion. More's father was imprisoned and later released after a fine was paid. Later, after Henry VIII had taken the crown and Thomas had become Speaker of the House of Commons, More, stood bes... ...s for the readers to make their own assumptions of his writings. Uncountable interpretations and assumptions of his works have been made, but he himself will never explain to us what his intent was. People theorize that Utopia represents More's "blueprint for society," or More's ideas for a socialistic world, or even as a satire of European society, but there is reasonable evidence to say that he only wanted to encourage thought, thought for improvement, whether it be socialism, movement in classes, change in professions, or anything else of the hundreds of differences between Utopia, and 15th century Europe. www.newadvent.org/cathen/14689c.htm">http://www.newadvent.org/cathen/14689c.htm More, Thomas, Utopia, p.41. The Penguin Book, Author's Translation by Paul Turner More, Thomas, Utopia, p.42. The Penguin Book, Author's Translation by Paul Turner

Thursday, October 24, 2019

Dumb Jobs

Dumb Jobs Many of us will work numerous dumb jobs in our lives before we finally get settled into a permanent  position. Dumb jobs such as working as an usher like the narrator in the essay: â€Å"Stupid Jobs Are Good to Relax With†. A couple of other examples would be jobs in a fast food restaurant or a retail store. In the essay, the narrator mentions that for the past couple of years he has relied on these â€Å"stupid jobs† in order to make enough of a living to get through life, while still studying at school.I think  what the author is saying here is very true because many students in university or college  are still in the middle of studying for that future full time career, but are still  being forced to work these jobs, part time, in order to pay their tuition and other expenses that come with university life these days. Expenses such as: residence, meals, phone bills and many others. As the title says, stupid jobs are good to relax with.Throughout the essay, the author is constantly trying to communicate with the audience that in these jobs you are allowed to be lazy and that just showing up and being there for your shift is good enough. This is when I begin to disagree with him because I believe that these temporary jobs should still be taken seriously in order to not only keep the job, but to also take away as many life lessons and common job skills as possible. This will surely help you have a better future in other jobs and careers.In general, I don’t think that these jobs are completely pointless like the author is making them seem at different moments in the essay. Finally, in my opinion these â€Å"dumb† jobs play a huge role in our society. They help develop important job skills and give teens and young adults some extra money that they can then go spends and help out the economy. They also give teens something to keep them busy and to take their minds off school or family life for a bit. Therefore, overall these jobs can be very useful in many different ways and should not be overlooked as pointless.

Tuesday, October 22, 2019

Social Engineering

Identity Theft: Social Engineering December 5, 2011 Daniel Sama & Stacey Smith Sr Computer Ethics CIS-324, Fall 2011 Strayer University Identity Theft: Social Engineering December 5, 2011 Daniel Sama & Stacey Smith Sr Computer Ethics CIS-324, Fall 2011 Strayer University Abstract Social Engineering from the outset may seem like a topic one might hear when talking about sociology or psychology, when in fact it is a form of identity theft. To an information technology (IT) professional, Social Engineering is a form of voluntary, unintentional identity theft. Many victims fail to realize they are being victimized until it is too late, while many others may never know. This paper will provide a definition of social engineering as it applies to information technology while introducing some the pioneers of social engineering; those who have, essentially, written the book on social engineering. We will provide real world examples of how social engineers apply their trade and provide important points to consider with regards to social engineering attacks. In conclusion we will propose counter-measures, which individuals and organizations should take in order to guard against social engineering. Social Engineering as defined by IT professionals is the practice of deceiving someone, either in person, over the phone or using a computer, with the express intent of breaching some level of security, either personal or professional (Ledford, 2011. ) Implementing quality risk analysis solutions while maintaining data integrity is a crucial element of successful system modeling; within the context of social engineering in the workplace, there are several factors that can make implementing those solutions rather challenging. Social engineering is a type of intrusion, which relies heavily on human interaction and usually involves the tricking of other people to break normal, everyday security policies. Social engineers (SE) often prey on the natural helpfulness of other people. When analyzing and attempting to conduct a particular attack, a SE will commonly appeal to vanity or authority as well as simple eavesdropping to acquire the desired information. Social engineering, in a nutshell is a hacker’s clever manipulation of the natural human tendency to trust. This will provide the unauthorized access to the valued information, system or machine. Never interrupt your enemy when he is making a mistake† (Bonaparte, n. d. ) This is a mantra for all successful SE’s, as they take any and all information about and from a target for later use against said target. The SE will gather as much information as possible about their target in advance, most of which is readily available online, usually , with just a few keystrokes; anything from hobbies to their favorite lunchtime meal. This information helps build a connection and instills trust with the target. With this trust, seemingly innocuous information will come flooding out of the target. Akin to fictional spies like James Bond and Michael Weston, SE’s assume a persona that is not their own and attempt to establish with their target a reasonable justification to fulfill a request. The aforementioned tactics allow the SE to maintain the facade and leave an out to avoid burning his or her information source. Bottom line; a good SE is a good actor. â€Å"All of the firewalls and encryption in the world will never stop a gifted social engineer from rifling a corporate database or an irate employee from crashing the system,† says pioneer Kevin Mitnick, the world’s most celebrated hacker who popularized the term. Mitnick firmly states in his two books The Art of Deception and The Art of Intrusion that it’s much easier to trick someone into giving a password for a system than spending the time using a brute force hack or other more traditional means to compromise the integrity of sensitive data. Mitnick who was a world famous controversial computer hacker in the late 1980’s was sentenced to 46 months in prison for hacking into the Pacific Bell telephone systems while evading the Federal Bureau of Investigation (FBI). The notorious hacker also allegedly wiretapped the California Department of Motor Vehicles (DMV), compromised the FBI and Pentagon’s systems. This led Mitnick to spend the majority of his time incarcerated in solitary confinement due to the government’s fear of him attempting to gain control of more sensitive information. Mitnick states in both of his aforementioned books that he compromised computers solely by using passwords and codes acquired as a result of social engineering. As a result, Mitnick was restricted from using any forms of technology upon his release from prison until approximately 5 years ago. Kevin Mitnick is now the CEO of Mitnick Security Consulting, a computer security consultancy. Social engineering awareness is a being addressed at the enterprise level as a vital corporate security initiative. Security experts advise that a properly trained staff, not technology is the best asset against social engineering attacks on sensitive information. The importance placed upon security policies is imperative when attempting to combat this type of attack. Combat strategies require action on both physical and psychological levels. This form appeals to hackers because the Internet is so widely used and it evades all intrusion detection systems. Social engineering is also a desirable method for hackers because of the low risk and low cost involved. There are no compatibility issues with social engineering; it works on every operating system. There’s no audit trail and if executed properly its effects can be completely devastating to the target. These attacks are real and staggering to any company, which is why strong corporate policies should be measured by access control and implementing specific procedures. One of the advantages of having such policies in place is that it negates the responsibility of an employee having to make a judgment call or using discretion regarding a social engineer’s request. Companies and their subsequent staffs have become much too relaxed as it pertains to corporate security initiative. These attacks can potentially be costly and unnerving to management as well as the IT department. Social engineering attacks commonly take place on two different levels: physical and psychological. Physical settings for these attacks can be anything from your office, your trash, over the telephone and even online. A rudimentary, common form of a social engineering attack is social engineering by telephone. Clever social engineers will attempt to target the company’s help desk while fooling the help desk representative into believing they are calling from inside the company. Help desks are specifically the most vulnerable to social engineering attacks since these employees are trained to be accommodating, be friendly and give out information. Help desk employees are minimally educated and get paid a below average salary so it is common for these individuals to answer one question and move right along to the next. This can potentially create an alarming security hole when the proper security initiative is not properly set into place. A classic example of this would be a SE calling the company operator and saying something like â€Å"Hi, I’m your AT&T rep; I’m stuck on a pole. I need you to punch a few buttons for me. † This type of attack is directed at the company’s help desk environment and nearly always successful. Other forms attack target those in charge of making multi-million dollar decisions for corporations, namely the CEO’s and CFO’s. A clever SE can get either one of these individuals to willingly offer information pertinent to hacking into a corporation’s network infrastructure. Though cases such as these are rarely documented, they still occur. Corporations spend millions of dollars to test for these kinds of attacks. Individuals who perform this specialized testing are referred to as Social Engineering Auditors. One of the premier SE Auditors in the industry today is Chris Hadnagy. Hadnagy states that on any given assignment, all he has to do is perform a bit of research on the key players in the company before he is ready to strike. In most cases he will play a sympathy card, pretending to be a member of a charity the CEO or CFO may belong to and make regular donations to. In one case, he called a CEO of a corporation pretending to be a fundraiser for a charity the CEO contributed to in the past. He stated they were having a raffle drawing and named off prizes such as major league game tickets and gift cards to a few restaurants, one of which happened to be a favorite of the CEO. When he was finished explaining all the prizes available he asked if it would be alright to email a flier outlining all the prizes up for grabs in a PDF. The CEO agreed and willingly gave Hadnagy his corporate email address. Hadnagy further asked for the version of Adobe Reader the company used under the guise he wanted to make sure he was sending a PDF the CEO could read. The CEO willingly gave this information up. With this information he was able to send a PDF with malicious code embedded that gave him unfettered access to the CEO’s machine and in essence the company’s servers (Goodchild, 2011). Not all SE attacks occur completely over the phone. Another case that Hadnagy reports on occurred at a theme park. The back story on this case is he was hired by a major theme park concerned about software security as their guest check-in computers were linked with corporate servers, and if the check-in computers were compromised a serious data breach may occur (Goodchild, 2011). Hadnagy started this attack by first calling the park posing as a software salesman, peddling newer PDF-reading software which he was offering free on a trial basis. From this phone call he was able to obtain the version of PDF-reader the park utilized and put the rest of his plan in action. He next headed to the park with his family, walking up to one of the employees at guest services asking if he could use one of their terminals to access his email. He was allowed to access his email to print off a coupon for admission to the park that day. What this email also allowed was to embed malicious code on to the servers and once again gained unfettered access to the parks servers. Hadnagy proposes six points to ponder in regards to social engineering attacks: * No information, regardless of it personal or emotional nature, is off limits for a SE seeking to do harm. It is often the person who thinks he is most secure who poses the biggest vulnerability to an organization. Executives are the easiest SE marks. * An organizations security policy is only as good as its enforcement. * SE’s will often play to the employees good nature and desire to be helpful * Social Engineering should be a part of an organizations defense strategy. * SE’s will often go for the low- hanging fruit. Everyone is a target if security is low. The first countermeasure of social engineering prevention begins with security policies. Employee training is essential in combating even the most cunning and sly social engineers. Just like social engineering itself, training on a psychological and physical basis is required to alleviate these attacks. Training must begin at the top with management. All management must understand that social engineering attacks stem from both a psychological and physical angle therefore they must implement adequate policies that can mitigate the damage from an attacker while having a robust, enforceable penalty process for those that violate those policies. Access control is a good place to start when applying these policies. A competent system administrator and his IT department should work cooperatively with management in hashing out policies that control and limit user’s permission to sensitive data. This will negate the responsibility on the part of an average employee from having to exercise personal judgment and discretion when a potential attack may occur. When suspicious calls for information occur within the company, the employee should keep three questions in mind: 1. Does the person asking deserve this information? 2. Why is she/he asking for it? 3. What are the possible repercussions of giving up the requested information? If there is a strong policy in place with enforceable penalties in place, these questions will help to reduce the potential for a SE attack (Scher, 2011). Another countermeasure against a social engineering attack is to limit the amount of information easily available online. With Facebook, Twitter, Four-Square and the like, there is an overabundance of information readily available at any given moment online. By just drastically limiting the amount of information available online it makes the SE’s task of information gathering that much more difficult. Throughout all of the tactics and strategies utilized when cultivating social engineering expertise, it’s extremely difficult to combat human error. So when implementing employee access control and information security, it is important to remember that everyone is human. This type of awareness can also be costly so it’s important to adopt a practical approach to fighting social engineering. Balancing company morale and pleasant work environment is a common difficulty when dealing with social engineering prevention and awareness. It is vital to keep in perspective that the threat of social engineering is very real and everyone is a potential target. References Bonaparte, N. (n. d. ). BrainyQuote. com. Retrieved December 6, 2011, from BrainyQuote. com Web site: http://www. brainyquote. com/quotes/authors/n/napoleon_bonaparte_3. html Goodchild, J. (2011). Social Engineering: 3 Examples of Human Hacking. Retrieved November 28, 2011 Retrieved from www. csoonline. om Web site: http://www. csoonline. com/article/663329/social-engineering-3-examples-of -human-hacking Fadia, A. and Manu, Z. (2008). Networking Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection. Boston, Massachusetts. Thompson Course Technology. 2008. Ledford, J. (2011). Identity Theft 101, Social Engineering. Retrieved from About. com on December 1, 2011. Retrieved from: http://www. idtheft. about. com/od/glossary/g/Social_Enginneering. htm Long, J. and Mitnick, K. (2008. ) No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder Surfing. Burlington, Massachusetts. Syngress Publishing Inc. 2008. Mann, I. Hacking the Human. Burlington, Vermont: Gower Publishing, 2008. Mitnick, K. and Simon, W. The Art of Deception. Indianapolis, Indiana: Wiley Publishing Inc. 2002. Mitnick, K. and Simon, W. (2006. ) The Art of Intrusion. Indianapolis, Indiana: Wiley Publishing Inc. 2006. Scher, R. (2011). Is This the Most Dangerous Man in America? Security Specialist Breaches Networks for Fun & Profit. Retrieved from ComputerPowerUser. com on November 29, 2011. Retrieved from: http://www. social-engineer. org/resources/CPU-MostDangerousMan. pdf