Social engineering methods
Attackers use a variety of social engineering methods to collect sensitive information from individuals or organizations that could be used to perpetrate fraud or other criminal acts.
This section will cover people-based, computer-based, and mobile-based social engineering approaches, all with examples to help you understand them better.
People-based social engineering
Human contact is a part of people-based social engineering. Pretending to be a real person, the attacker interacts with a target organization employee to obtain sensitive information, such as corporate strategies and networks, that will aid them in launching their attack. The attacker can simply access the server room by impersonating an IT support technician, for example.
An attacker can use the following methods to execute human-based social engineering.
Impersonation
Impersonation is a frequent people-based social engineering method in which the attacker poses as a legitimate...