Fortune Telling Collection - Free divination - Social engineering takes advantage of human weaknesses, including

Social engineering takes advantage of human weaknesses, including

What is social engineering?

The so-called social engineering refers to the art of using human psychology to gain access to buildings, systems and data, which is different from using hackers' invasion means. For example, social engineers can pretend to be employees or IT support personnel, trying to trick the target into getting the other person's password instead of looking for software vulnerabilities. The goal of social engineers is usually to gain the trust of one or more goals.

Kevin Mitnick, a famous hacker, began to popularize the concept of social engineering in the 1990s, but the idea at that time was relatively simple, that is, deceiving someone to do something or revealing sensitive information.

Goal: improve acting skills and get information.

The goal of many social engineers is to obtain personal information, which may directly lead to the theft of the property or identity of the target or prepare to launch a more targeted attack on the target. Social engineers will also look for ways to install malicious software to better access the personal data, computer systems or accounts of the target. In addition, social engineers may also be looking for information that can gain a competitive advantage.

Valuable information includes:

password

account number

secret key

Any personal information

Identification documents for visiting Kahe River

Telephone list

Details of the computer system

List of people with access rights

Information such as server, network, URL address of non-public network, internal LAN, etc.

Playing social workers requires divination and acting.

There are many ways to attack social engineering. A fraudster may trick you into opening doors for him, visiting phishing websites, downloading files containing malicious code, or he can access your company network by using the USB interface on your computer. Typical strategies include:

"Metaphysics" guessing password: Hackers use the social network portrait of the target to guess the password or security problems of the victim.

Pretend to be a mature person: In this case, hackers gain the trust of individuals or groups and let them click on links or attachments containing malicious software.

Pretend to be friends on social networks: In this case, a hacker pretends to be a familiar netizen and contacts you online, asking you to help send a data from the "office" or send him a form. "You know, anything you see on the computer may be disguised, false or modified."