Advanced Cybersecurity Technologies by Ralph Moseley;

Advanced Cybersecurity Technologies by Ralph Moseley;

Author:Ralph Moseley;
Language: eng
Format: epub
ISBN: 9781000514605
Publisher: CRC Press (Unlimited)
Published: 2021-10-28T00:00:00+00:00


Other varieties

There are many types of social engineering, based on a mix of the main principles mentioned and the techniques above. They can be very simple, based on confidence tricks, or be complex, with both psychological and technical elements.

Social engineering process

Social engineering can be shown as a cycle which involves research, engagement, the attack itself and the closing of the interaction.

Research

Although some attacks on systems, with humans as the main entry point, are opportunistic, most will have a significant amount of research or investigation behind them. This research is based on watching the victim carefully and their routes and habits. Watching their social media, physical activities and suchlike will reveal their interests and often personal information which will be useful for accessing systems or manipulation in a social engineering sense. Having good background information can determine the success of the whole venture. The investigation stage will also reveal suitable attack methods to the hacker.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.