Define social engineering and briefly describe how it is accomplished.

What will be an ideal response?


Within the context of information security, social engineering is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. This can be done in several ways, and usually involves the perpetrator posing as a person higher in the organizational hierarchy than the victim. To prepare for this false representation, the perpetrator may have used social engineering against others in the organization to collect seemingly unrelated information that, when used together, makes the false representation more credible.

Computer Science & Information Technology

You might also like to view...

A Truth Table is a matrix that provides true or false for every possible combination for an OR, NOT, or AND criteria combination

Indicate whether the statement is true or false

Computer Science & Information Technology

In Excel, you can create simple ________, which are collections of data related to a particular topic or purpose

A) arrays B) databases C) functions D) tables

Computer Science & Information Technology

Microsoft Hyper-V is an example of server virtualization software.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ is a short, boxed area of content on a page that provides additional information about a topic.

A. sidebar B. sidenote C. pullquote D. areaquote

Computer Science & Information Technology