Define social engineering and briefly describe how it is accomplished.
What will be an ideal response?
Within the context of information security, social engineering is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. This can be done in several ways, and usually involves the perpetrator posing as a person higher in the organizational hierarchy than the victim. To prepare for this false representation, the perpetrator may have used social engineering against others in the organization to collect seemingly unrelated information that, when used together, makes the false representation more credible.
You might also like to view...
A Truth Table is a matrix that provides true or false for every possible combination for an OR, NOT, or AND criteria combination
Indicate whether the statement is true or false
In Excel, you can create simple ________, which are collections of data related to a particular topic or purpose
A) arrays B) databases C) functions D) tables
Microsoft Hyper-V is an example of server virtualization software.
Answer the following statement true (T) or false (F)
A(n) ____ is a short, boxed area of content on a page that provides additional information about a topic.
A. sidebar B. sidenote C. pullquote D. areaquote