What is Social Engineering ?
Is the art of Manipulating people, so as to get confidential information from them.
Malicious hackers pose as someone to get confidential information from their victim, this information is now used to steal, delete files, or espionage.
Why Hackers Use Social Engineering.
Firewalls, access controls, and authentication devices cannot stop a social engineer from getting information he needs, since social engineering is a non-technical method of intrusion.
Social engineering attacks can be performed in many ways, such as via mere phone calls or email.
Social engineers know that many organizations don’t have formal data classifications,
access-control systems, incident response plans, and security
awareness programs, and they often take advantage of these weaknesses.
The more information a social engineer gains about an organization, the easier it is for him/her to pose as an organisations employee or trusted personnel.
Effective social engineers can obtain the following information:
✓ User or administrator passwords
✓ Security badges or keys to the building and even to the computer room
✓ Intellectual property such as design specifications, formulae, or other
research and development documentation
✓ Confidential financial reports
✓ Private and confidential employee information
✓ Customer lists and sales prospects
Note: Recovery and protection is difficult after the attack has been done.
Protect your tongue, develop a firewall for your tongue.
0 comments:
Post a Comment