Topic: The Impact of Social Engineering I. Introduction A. Definition of Social Engineering B. The goal of Social Engineering C. Reverse Social Engineering
II. Body D. Categories of Social Engineering 1. Technology based 2. Non-Technology based E. Types of Social Engineering attacks
III. Conclusion F. Defense against Social Engineering G. Impact of a Social Engineering attack
Introduction
Social engineering has become the most popular method of compromising the security of personal data. The successful use of Social Engineering techniques has provided attackers and hackers the ability to breach computer systems and gain access to sensitive data. Many computer hackers such as renowned hacker Kevin Mitnick have found that it is easier to trick somebody into giving his or her password than to carry out an elaborate hacking attempt (Mitnick and Simon, 2002).
What is social engineering?
Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques (Godchild. 2011)”. Social engineering involves the use of manipulation to trick others into revealing and or providing the needed information that can be used to steal data and or gain access to secured systems. Most victims of social engineering attacks never see their attackers and they seldom realize that they have been hacked or manipulated.
The goal of social engineering
The main goal or focus of social engineering is to use human weakness to gain access to secure systems and or data. Despite the implementation of a wide range of security controls and measures into a secured system; there will always be a human linked to the system. Humans are the weakest link in all secured systems. “Securing the hardware, software, and firmware