Social engineering requires a unique skill to get around security controls not by exploiting vulnerabilities in a system and hacking but exploiting vulnerabilities in human beings. Social engineering is done using a type of masquerading. A person masquerading …show more content…
Social engineering can be both positive and negative impact on individuals and on society. Even if systems and technology can be made as the most secured technology, but it will be useless or worthless if weakest link is human …show more content…
This where humans act as weakest link and, also this is where humans should be alert that if they want to secure their systems and information, they should be aware about all techniques to prevent this incident happening with them.
Sales person and Recruiters
Con man/ identity thefts
Other groups and organization
Spices and intelligent services
Method of social engineering: -
Now we know about what social engineering is? and why social engineering method is used to circumvent security, and types of people who have these kinds of skills. But how people initiate social engineering attack.
Figure1: - Social Engineering Approach
Phase 1 – Reconnaissance an information gathering: