• Home
  • Cybersecurity Controls
  • SOCIAL ENGINEERING
  • Solutions
  • Contact us

SOCIAL ENGINEERING

Social engineering is a technique used by cybercriminals to trick individuals or organizations into divulging sensitive information or performing actions that can compromise their security. It involves exploiting human psychology and emotions to gain access to confidential information, systems, or networks. Social engineering techniques include phishing emails, pretexting, baiting, and other methods. Here are some examples of social engineering techniques:

1

Phishing

Phishing emails are fake emails that appear to come from a trusted source, such as a bank or an online service provider. These emails may ask the recipient to provide sensitive information, such as login credentials, credit card details, or other personal information.

2

Pretexting

Creating a situation to gain access to private information is known as pretexting. Social engineering techniques include calling a target and pretending to be a tech support representative who wants access to their computer to resolve a problem.

3

Baiting

Baiting is a form of social engineering in which an enticing object, such a USB drive, is left in a public area in the hopes that someone will pick it up and put it into their computer. The security of the computer could be jeopardized by malware or other dangerous software on the USB device.

4

Impersonation

Impersonation is the act of posing as someone else to gain access to sensitive information or systems. This may involve creating a fake online profile, or even physically impersonating someone to gain access to restricted areas.

5

Spear Phishing

A spear phishing attack targets a specific person or group and is known as a targeted phishing attack. The attacker might fabricate a persuasive email that appears to be from a reliable source using data obtained from social media or other sources.
Tek Training Solutions Inc.
1000 N West StreetWilmington, DE 19801 (302) 295-4832
Copyright © 2023 Network Solutions, LLC. All rights reserved.

We use cookies to enable essential functionality on our website, and analyze website traffic. By clicking Accept you consent to our use of cookies. Read about how we use cookies.

Your Cookie Settings

We use cookies to enable essential functionality on our website, and analyze website traffic. Read about how we use cookies.

Cookie Categories
Essential

These cookies are strictly necessary to provide you with services available through our websites. You cannot refuse these cookies without impacting how our websites function. You can block or delete them by changing your browser settings, as described under the heading "Managing cookies" in the Privacy and Cookies Policy.

Analytics

These cookies collect information that is used in aggregate form to help us understand how our websites are being used or how effective our marketing campaigns are.