L09 - IS - Social Engineering
L09 - IS - Social Engineering
L09 - IS - Social Engineering
Social Engineering
What is Social Engineering ?
Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain
control over a computer system, or to steal personal and financial information. It uses psychological
manipulation to trick users into making security mistakes or giving away sensitive information.
Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended
victim to gather necessary background information, such as potential points of entry and weak security
protocols, needed to proceed with the attack. Then, the attacker uses a form of pretexting such as
impersonation to gain the victim’s trust and provide stimuli for subsequent actions that break security
practices, such as revealing sensitive information or granting access to critical resources.
interaction is involved. The following are common forms of digital social engineering attacks.
Phishing: The process of attempting to acquire sensitive information such as usernames, passwords,
and credit card details by masquerading as a trustworthy entity using bulk email, SMS text messaging,
or by phone. Phishing messages create a sense of urgency, curiosity, or fear in the recipients of the
message. The message will prod victims into revealing sensitive information, clicking on links to
malicious websites, or opening attachments that contain malware
Baiting: A type of social engineering attack where a scammer uses a false promise to lure a victim into
a trap which may steal personal and financial information or inflict the system with malware. The trap
leave the bait of a malware-infected flash drives in conspicuous areas where potential victims are certain
to see them. When the victim inserts the flash drive into a work or home computer, the malware is
automatically installed on the system. Baiting scams are also online in the form of tempting ads that
engineering tactics. The attacker might impersonate a delivery driver, or custodian worker. Once the
employee opens the door, the attacker asks the employee to hold the door, thereby gaining access to
the building.
Scareware: Scareware involves victims being bombarded with false alarms and fictitious threats. Users
are deceived to think their system is infected with malware, prompting them to install software that
grants remote access for the criminal or to pay the criminal in a form of bitcoin in order to preserve
credit cards, student loans, other account information, in the garbage when it hasn’t been properly
sanitized or destroyed.
Quid Pro Quo: Quid pro quo involves a criminal requesting the exchange of some type of sensitive
information such as critical data, login credentials, or monetary value in exchange for a service. For
example, a computer user might receive a phone call from the criminal who, posed as a technology
expert, offers free IT assistance or technology improvements in exchange for login credentials. If an
offer sounds too good to be true, it most likely a scam and not legitimate.
ChatGPT
Social engineering in information security refers to the manipulation of individuals into divulging
confidential information or performing actions that compromise security. Unlike technical attacks that
exploit vulnerabilities in software or hardware, social engineering attacks exploit human psychology and
behavior.
1. Phishing: This is one of the most common forms. Attackers use fake emails, websites, or
messages that appear to be from legitimate sources to trick individuals into providing sensitive
information like passwords or financial details.
2. Spear Phishing: A more targeted form of phishing where the attacker customizes their message
to a specific individual or organization, often using personal information to make the scam more
convincing.
3. Pretexting: The attacker creates a fabricated scenario to obtain information. For example, they
might pose as a trusted authority figure or a company representative to gain access to sensitive
data.
4. Baiting: This involves offering something enticing (like a free software download) to lure victims
into providing information or installing malicious software.
5. Quizzes and Surveys: Attackers use seemingly innocent quizzes or surveys to collect personal
information that can be used for further attacks or identity theft.
6. Tailgating: This is a physical security breach where an attacker follows someone into a secure
area by pretending to be an authorized individual.
7. Impersonation: The attacker pretends to be someone the target knows or respects (like a boss
or IT support staff) to gain access to confidential information.
1. Education and Training: Regular training for employees and individuals on recognizing and
responding to social engineering tactics is crucial. This can include awareness programs and
simulated phishing exercises.
2. Verify Requests: Always verify the identity of individuals requesting sensitive information or
access, especially if the request is unexpected or out of the ordinary.
3. Implement Policies: Develop and enforce security policies and procedures, including guidelines
for handling sensitive information and reporting suspicious activities.
4. Use Multi-Factor Authentication (MFA): MFA adds an extra layer of security, making it harder
for attackers to gain access even if they obtain a password.
5. Secure Physical Access: Implement physical security measures to prevent unauthorized access
to facilities and sensitive areas, such as using access cards and security personnel.
6. Regularly Update Software: Keep systems and software up-to-date to protect against known
vulnerabilities that attackers might exploit in conjunction with social engineering tactics.
7. Encourage a Culture of Security: Promote a security-conscious culture where employees feel
comfortable reporting suspicious activities without fear of reprisal.
By understanding and preparing for social engineering attacks, individuals and organizations can better
protect themselves from these manipulative and often deceptive threats.