wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Social engineering in cyber security

profile
44_Vikash Yadav
Aug 24, 2023
0 Likes
1 Discussions
145 Reads

Social Engineering:

Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. In cybercrime, the human hacking scams entire inspecting users to disclose data spread malware infractions, or restricted systems. Attacks can occur online, in-persion and by other types. Direct communication is used in social engineering attacks that incorporate interpersonal engagement (such as in person or by telephone or by email or by social media and internet). Social engineering is a common form of cybercrime. The act of obtaining unauthorized access to a system or sensitive information, such as passwords, using trust and relationship building with others

Example- One of the most popular Social Engineering attack example, Phishing scam are email and text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. Baiting is when the fraudster user greed or curiosity to trap the victim with false promises and trick ten into handing their login credentials. Spear phishing and CEO Fraud are also real example.

 

Steps of a Social Engineering Attack:

  Social Engineering attacks typically follow these simple Steps:

  1. Research: The attacker identifies victims and choose a method of attack.
  2. Engage: The attacker makes and begins the process of establishing trust and helpfulness.
  3. Attack: The attack commences and the attacker collects the payload.
  4. The Getaway: The Attacker covers their tracks and concludes the attack.

 

Characteristics of Social Engineering Attack:

Social Engineering manipulate  human feeling, such as curiosity or fear, to carry out schemes and draw victims into their traps. Therefore, be warry whenever you feel alarmed by email, attracted to an offer displayed on a website, or when you come across stray digital media lying about. Being alerts can help you protect yourself against most social engineering on attack taking place in the digital realm.

High emotions manipulating gives attackers  the upper hand in any conversation. The feeling are used equally to explain to you.

  • Fear
  • Excitement
  • Curiosity
  • Sadness

 

Social Engineering prevention: .

Be careful of what you share. And no, you don't need to be paranoid about these attacks. Preventing them is possible. The following  tips can help improve your vigilance in relation to social engineering hacks. 

 

  • Don't open emails and attachments from suspicious source- If you don't know the sender in question you don't need to answer an email. Even if you do know them and are suspicious massage. 
  • Never use the same password for different accounts- If the attacker gets hold of one account, they will be able to hack other accounts too. 
  • Use multifactor authentication- Most valuable pieces of information attackers seek are user credentials. Using multifactor authentication helps ensure your account's protected otherwise compromise. 
  • Keep your antivirus /antimalware software updated- Make a habit to download the latest signatures first thing each day.  make sure thate the updates have been applied, and scan your systems for possible infections. 

Comments ()


Sign in

Read Next

Concurrency and memory

Blog banner

Uniprocessor Scheduling

Blog banner

Why Data Security Is Important

Blog banner

indian premier league

Blog banner

ASANA- A Management System.

Blog banner

'Positivity in life'

Blog banner

Game Theory in Blockchain

Blog banner

PERSONAL STORIES

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Culture Of Ladakh

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

A buffer overflow

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Why home remedies don’t work for Hangover?

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Scheduling

Blog banner

Network Forensics Tools and Techniques

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Having passion in life

Blog banner

Deadlock

Blog banner

NETWORK SECURITY RISKS

Blog banner

Best password managers: Reviews of the top products

Blog banner

Be you

Blog banner

INTERNET SECURITY

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Race condition

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

File Sharing

Blog banner

All you need to know about Cassandra

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Service Transition Process in ITSM

Blog banner

virtual memory

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Deadlock and Starvation

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner