-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Art of Social Engineering
By :

Social engineering is the art of manipulating users to perform actions or divulge confidential information for the benefit of the attacker.
Examples of those actions can be as follows:
Additionally, examples of the types of information that the attacker may want to gather from the victims are as follows:
While most people believe they will never fall victim to this type of attack, the truth is that we are all susceptible to a social engineering attack.
In fact, social engineering attacks have evolved into well-fabricated scenarios that are carefully crafted to leverage a series of physiology paradigms to effectively trick and manipulate the victim without them even noticing that they are under attack.
Therefore, organizations must invest time and resources to include social engineering awareness campaigns as part of their cybersecurity strategy to reduce the risks of employees falling into these types of attacks.
A common mistake is to focus social engineering awareness campaigns on IT people, while in reality, attackers prefer to attack other employee profiles, as follows:
Figure 1.1 – Manipulating non-IT employees
Figure 1.2 – Manipulating overwhelmed users
Figure 1.3 – Manipulating sales teams
Figure 1.4 – Manipulating executive assistants
Of course, those are only a few examples of groups that are more prone to be attacked by a social engineering attack, but in the end, what we want to highlight is the importance of ensuring that the organization is well-trained and aware of the threats of social engineering attacks.
The bottom line is that users are the biggest layer of defense to prevent those attacks in your organization, therefore, ensuring that everyone is well-trained to recognize those attacks should be a key component in your cybersecurity strategy.
Now, while manipulation is the art used by attackers, there are a lot of psychological principles behind this that enable the attacker to successfully manipulate users not only to perform those actions but to do it without doubting the intention of the attacker. Now, let’s review them in detail.
Change the font size
Change margin width
Change background colour