You are on page 1of 6

SOCIAL

ENGINEERING
NAME: EMMANUEL KAPASHI
REGISTRATION NO.: 11609729
ROLL NO.: 35
Introduction

 Unauthorized access and or alteration of data in an organization is due to some


vulnerabilities present in the organization. Unfortunately some of these
vulnerabilities are people. People like computers can be exploited and this is
where the term Social Engineering come into picture. Social Engineering is the
term used for a broad range of malicious activities accomplished through human
interactions. It uses psychological manipulation to trick users into making security
mistakes or giving away sensitive information.
4 STEPS OF SOCIAL ENGINEERING
TYPES OF SOCIAL ENGINEERING ATTACKS AND THEIR
COUNTERMEASURES

NON-TECHNICAL TECHNICAL
 Tailgating
 Impersonation
• Phishing
 Piggybacking • Baiting
 Pretexting
 Quid pro quo
 Eavesdropping
 Shoulder surfing
 Dumpster diving
 Revers social engineering
Recommendation

 The best way to avoid social engineering is education, it is advisable to educate


every employee of the organization on social engineering, if people are aware of
how social engineering attack happens they will vigilant and able to tell whether
there is an attack.
CONCLUSION

 We see that over the years social engineering attacks have rapidly increases and
this is due to the increase in system security leaving people to be the greatest
vulnerability, apparently people are now more vulnerable to exploitation compared
to computer, but this can change with enough education regarding social
engineering attack, how it’s performed and how it can be avoided. I believe that it
is correct to conclude that social engineering attacks are successful because of
ignorance on the victim’s side.

You might also like