Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Art of Social Engineering

You're reading from   The Art of Social Engineering Uncover the secrets behind the human dynamics in cybersecurity

Arrow left icon
Product type Paperback
Published in Oct 2023
Publisher Packt
ISBN-13 9781804613641
Length 234 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Cesar Bravo Cesar Bravo
Author Profile Icon Cesar Bravo
Cesar Bravo
Desilda Toska Desilda Toska
Author Profile Icon Desilda Toska
Desilda Toska
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1: Understanding Social Engineering
2. Chapter 1: The Psychology behind Social Engineering FREE CHAPTER 3. Chapter 2: Understanding Social Engineering 4. Chapter 3: Common Scam Attacks 5. Chapter 4: Types of Social Engineering Attacks 6. Part 2: Enhanced Social Engineering Attacks
7. Chapter 5: Enhanced Social Engineering Attacks 8. Chapter 6: Social Engineering and Social Network Attacks 9. Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks 10. Chapter 8: The Social Engineering Toolkit (SET) 11. Part 3: Protecting against Social Engineering Attacks
12. Chapter 9: Understanding the Social Engineering Life Cycle 13. Chapter 10: Defensive Strategies for Social Engineering 14. Chapter 11: Applicable Laws and Regulations for Social Engineering 15. Index 16. Other Books You May Enjoy

The Psychology behind Social Engineering

You have probably heard the term social engineering before, either in the news (as part of a big scam) or even in your job as part of the annual security awareness program.

But what is social engineering? Well, to make it simple, we can just say that social engineering is the art of manipulating people to perform an action that will provide a benefit for the attacker. That action could be in the form of disclosing information, executing an action (such as executing a command), or even disabling or bypassing a security measure.

In other words, social engineering is focused on “hacking” the users, not the systems.

Now, to better understand social engineering, it is imperative to understand the psychology, principles, and tactics behind those attacks. Attackers will leverage a set of psychological concepts, principles, and tactics to successfully manipulate the victim. They will then use the art of manipulation to influence the victim to either reveal sensitive information (passwords, users, etc.) or even perform a given action (such as disabling the antivirus).

Understanding those tactics will help you to identify when you are a target and avoid falling into these elaborate attack vectors. For this reason, in this chapter, we will cover the following main topics:

  • The art of manipulation
  • Tactics and principles used to influence the victims
  • Developing rapport
  • The weakness behind the empathy
  • Leveraging influence tactics for defensive security
You have been reading a chapter from
The Art of Social Engineering
Published in: Oct 2023
Publisher: Packt
ISBN-13: 9781804613641
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime