Question: Objective: Understand the various ways that social engineering can be performed. Video: Lab 1 0 Ethical Hacking These are nine of the most common examples
Objective: Understand the various ways that social engineering can be performed.
Video: Lab Ethical Hacking
These are nine of the most common examples of social engineering are, provide a short
definition for each:
Phishing:
Spear Phishing:
Baiting:
Malware:
Pretexting:
Quid Pro Quo:
Tailgating:
Vishing:
WaterHoling:
How Does Social Engineering Happen?
Social engineering happens because of the human instinct of trust. Cybercriminals have learned
that a carefully worded email, voicemail, or text message can convince people to transfer money,
provide confidential information, or download a file that installs malware on the company
network.
Consider this example of spear phishing that convinced an employee to transfer $ to a
foreign investor:
Thanks to careful spear phishing research, the cybercriminal knows the company CEO is
traveling.
An email is sent to a company employee that looks like it came from the CEO. There is a slight
discrepancy in the email address but the spelling of the CEOs name is correct.
In the email, the employee is asked to help the CEO out by transferring $ to a new
foreign investor. The email uses urgent yet friendly language, convincing the employee that he
will be helping both the CEO and the company.
The email stresses that the CEO would do this transfer herself but since she is travelling, she
cant make the fund transfer in time to secure the foreign investment partnership.
Without verifying the details, the employee decides to act. He truly believes that he is helping
the CEO, the company, and his colleagues by complying with the email request.
A few days later, the victimized employee, CEO, and company colleagues realize they have been
a victim of a social engineering attack and have lost $
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
