Social Engineering, Password Guidance, and Policy
While in the previous chapter we got an in-depth look into policies and procedures, now we are going to understand the most powerful attack vector: social engineering. Why is it the most powerful? Mainly because it attacks the weakest link of the security chain: humans. While a machine (software) is intended to execute commands and orders, we use our intelligence, feelings, and so on to interact with others. But it’s the interaction with other human beings to make us behave differently and in a less secure way.
In this chapter, we will cover the following topics:
- The starting point
- Common social engineering attack methods
- Have you got a M.A.P.P.?