Lesson3Module3Lec DataSecurityAwareness
Lesson3Module3Lec DataSecurityAwareness
LESSON 3:
SOCIAL ENGINEERING
1. To be aware of the
most common social engineering techniques and the
psychology of influence (for instance: scarcity, urgency
and reciprocity), in order to combat these threats.
2. Understanding the Social Engineering Techniques
3. Understanding the Social Engineering Attacks and to know
how to avoid those attacks.
Phishing attacks are a subset of social engineering strategy that imitate a trusted source and
concoct a seemingly logical scenario for handing over login credentials or other sensitive personal
data. According to Webroot data, financial institutions represent the vast majority of impersonated
companies and, according to Verizon's annual Data Breach Investigations Report, social
engineering attacks including phishing and pretexting (see below) are responsible for 93% of
successful data breaches.
Or, the scheme may show up as an amazingly great deal on classified sites, auction sites, etc.. To allay
your suspicion, you can see the seller has a good rating (all planned and crafted ahead of time).
While phishing attacks are rampant, short-lived, and need only a few
users to take the bait for a successful campaign, there are methods for
protecting yourself. Most don't require much more than simply paying
attention to the details in front of you. Keep the following in mind to
avoid being phished yourself.
If you don’t know the sender personally AND expect a file from them,
downloading anything is a mistake.