Social Engineering Concepts
Vulnerability to Social Engineering Attacks
Phases of a Social Engineering Attack
- Research
- Select Target
- Relationship
- Exploit
Social Engineering Techniques
Human-based Social Engineering
- Impersonation
- Eavesdropping and Shoulder Surfing
- Dumpster Diving
- Reverse Social Engineering
- Piggybacking and Tailgating
Computer-based Social Engineering
- Phishing
- Spear Phishing
Mobile-based Social Engineering
- Publishing Malicious Apps
- Repackaging Legitimate Apps
- Fake Security Apps
Insider Attack
Impersonation on Social Networking Sites
Social Engineering Through Impersonation on Social Networking Sites
Risks of Social Networking in a Corporate Networks
Identity Theft
The process of Identity theft
Social Engineering Countermeasures