What type of information is usually gathered by social engineering?

What will be an ideal response?


In computer attacks, the information is usually a password to a network or other information an attacker could use to compromise a network. A salesperson can get personal information about customers, such as income, hobbies, social life, drinking habits, music preferences, and the like, just by asking the customer the right questions. Social engineers might also use persuasion tactics, intimidation, coercion, extortion, and even blackmail to gather the information they need. They are probably the biggest security threat to networks and the most difficult to protect against.

Computer Science & Information Technology

You might also like to view...

Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the array?

a. *( tPtr + 3 ) b. tPtr[ 3 ] c. &t[ 3 ] d. *( t + 3 )

Computer Science & Information Technology

Windows 8 no longer offers screen saver options

Indicate whether the statement is true or false

Computer Science & Information Technology

You can provide another level of security for your workbook by adding encryption

Indicate whether the statement is true or false

Computer Science & Information Technology

Three useful variations on the sequential search algorithm are: (1) the sentinel search, (2) the probability search, and (3) the ordered list search.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology