Chapter 8: Social Engineering
There's no single security device that can guard against an attacker's use of social engineering techniques. Only through continuous training and educating employees on how to identify and respond to social engineering attempts can an attacker's chances of succeeding be reduced.
We will explore the many aspects of social engineering and the ways attackers use it to accomplish their purposes, as well as how to better identify and respond to and educate and protect ourselves and our organization from its purposes.
In this chapter, we will discuss the following:
- Understanding social engineering
- Attack-vulnerable behaviors
- What makes social engineering work?
- Social engineering's attack phases
- Social engineering methods
- Threats from within
- Threats to corporate networks from social media
- Identity theft
- Countermeasures
Before proceeding with this subject, let's review some of the basic...