Describe social engineering.

What will be an ideal response?


Social engineering is a means of launching an attack or gathering information for an attack by
relying on the weaknesses of individuals. It represents one of the greatest risks that organizations today face. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions. These basic methods of persuasion include ingratiation (flattery or insincerity), conformity (everyone else is doing it), and friendliness. Through these means the attacker attempts to convince the victim that the attacker can be trusted.

Computer Science & Information Technology

You might also like to view...

It is possible to edit a label inside a cell, but to activate it first _____ the cell.

A. left-click B. double-click C. right-click D. point to

Computer Science & Information Technology

The Show Markup button displays comments and other annotations

Indicate whether the statement is true or false

Computer Science & Information Technology

By default, Excel is set to print pages in landscape orientation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When would be an ideal time to gather baseline data regarding Active Directory performance?

What will be an ideal response?

Computer Science & Information Technology