You’ve probably heard about social engineering, but have your users? Do your users know they are the single biggest threat to the security of your organization? Social engineering comes in many forms. Users must be educated on the creative ways attackers leverage social engineering to take advantage of human nature.
Demonstrating social engineering for Professor Tim Richardson's E-Business Strategies class (MGD415). We found an old McDonald's cup someone had thrown away outside of McDonald's, filled it with a bottle of water and told the drive-thru it was too cold...free latte.
What Is "Social Engineering"? Social engineering is also called social hacking or social cracking. Social engineering is stealing important security information such as ID or passwords, not by technically but by socially. Popular example is picking through trash of a company or an organization and finding discs that contain secret documents or important data. Even you may use a paper shredder, it can be reconnected. Also, it is other way calls and asks information by lying about his/her identity. In a company, perpetrators may pass himself off as a boss, call to system management center, and say “I forgot passwords, so please tell me again”. There are a lot of other ways. Companies have to set up exacting rules of important data to prevent social engineering.
Social Engineering describes methods of influencing people with the goal of illegally obtaining sensitive data (e.g. passwords, credit card information). Social Engineers observe the personal environment of their victims and use fake identities to gain secret information or free services. In most cases Social Engineering is used to infiltrate third party computer systems to spy on sensitive data; in that case social engineering is also called Social Hacking.
An early form of social engineering first appeared in the 1980′s and was named phreaking. Phreakers called phone companies and claimed to be system