Attack-vulnerable behaviors
When we think about attack-vulnerable behaviors and what this means, we're talking about the natural, intrinsic feelings and responses of people. These can be exploited by an attacker using the following:
- Authority: The right to exercise power in an organization is referred to as authority. Attackers take advantage of this by posing as someone of authority in a target organization, such as a technician or an executive, to steal sensitive information.
- Intimidation: The use of bullying tactics to intimidate a victim into taking multiple actions is referred to as intimidation. It's frequently carried out by impersonating someone else and duping victims into divulging crucial information.
- Social proof versus consensus: People are frequently willing to like or do things other people enjoy or do, which is known as consensus.
Attackers take advantage of this by building websites and posting fictitious customer testimonials regarding...