Social Engineering - Introduction


Social engineering is a 'con' act. For example, a person using social engineering to break into a computer network would try to gain the confidence of someone who is authorized to access the network in order to get them to reveal information that compromises the network's security. They might call the authorized employee with some kind of urgent problem; social engineering often rely on the natural helpfulness of people as well as on their weakness. 
social engneering



Appeal to vanity, appeal to authority, and old-fashioned eavesdropping are typical social engineering techniques. Some other tricks is even flirting, googling special text and so on. Another aspect of social engineering relies on people's in ability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information  they posses and are careless about protecting it. 

Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone's shoulder, or take advantage of people's natural inclination to choose passwords that are meaningful to them but can be easily guessed. Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.

..................................................(to be continue)
Share on Google Plus

About Unknown

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
    Blogger Comment
    Facebook Comment

0 comments :

Post a Comment