Social Engineering Attack | Types of Social Engineering

 

What is Social Engineering?

 

Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system.

 

The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.

 

How Social Engineering Works ?

 




 
  • Gather Information :
    • First stage, we learn as much as about our victim
    • Information gathered from company websites,other publications and sometimes by talking to the users of the target system.
  • Plan Attack :
    • 2nd Stage, The attackers outline how he/she intends to execute the attack
  • Acquire Tools :
    • 3rd Stage , These include computer programs that an attacker will use when launching the attack.
  • Attack :
    • 4th Stage , Exploit the weaknesses in the target system.
  • Use Acquired Knowledge :
    • Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing.

The Most Common Social Engineering Attacks

  • Phishing
  • Baiting
  • Spear Phishing
  • Tailgating
  • Scareware
  • Pretexting
  • Quid Pro Quo

Thanks for reading,
To your success
Aman Yadav 



#socialengineering #cybersecurity #agenda #newworldorder #nwo #infosec #phishing #cybercrime #security #g #haarp #projectbluebeam #depopulation #geoengineering #hollywood #georgiaguidestones #financialfreedom #financialeducation #thematrix #chemtrails #revolution  #eipsteindidntkillhimself #massmediacontrol #federalreserve #markofthebeast #microchip #chemicalwarfare #bhfyp #love #amansays

Post a Comment

0 Comments