Social Engineering

Classic Example of Social Engineering

Trojan horse

Soft Center within the hard shell

Human Weakness

Greed

Fear

Urgency

Impersonation

Curiosity

Helpfulness

Types of Social Engineering Attacks

Counter Measures to Social Engineering

  • Defense in both browser and email clients
  • Physical security (chip based id cards, smart security personnel, card enabled gates)
  • Separation of duties and least privileges (Introduce concept of duties; involve more than one person to complete a task, Only give access that is needed to perform a legitimate purpose)
  • Logging, Auditing & Monitoring
  • 2FA

--

--

--

Lead QA Engineer @plerion | stockMarket Lover!

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

SolPad — Public Sale Whitelist Now Open!

A crash course on azure’s additional features from a pentester perspective.

Secure k-Anonymization over Encrypted Databases

We take the least ever fee for investments and ensure hefty returns for you!

It’s Never Too Early for Spring Cleaning.

New Cryptocurrency Airdrops That Give You Actual Free Coins Without No Investment -(2021 May…

airdrops, free crypto airdrops, free airdrops

GST Officials Bust Fake Invoice Racket Worth Rs 50 Crores, Arrest 1

GST Officials Bust Fake Invoice Racket Worth Rs 50 Crores, Arrest 1

{UPDATE} Four In Space 3D Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Manzeel Uprety

Manzeel Uprety

Lead QA Engineer @plerion | stockMarket Lover!

More from Medium

VPC Routes, Nah!! Endpoint Service, Yah!!(AWS)

The Complete Guide to Securing Your Software Development Lifecycle

Develop your own VPN: Smoke test with Github Actions

Tips to Prevent Businesses From Cyber Attacks