Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 2, Problem 19RQ
Program Plan Intro

Social engineering:

Social engineering is a technique of manipulating people psychology to make them perform some actions or to get the confidential information about an organization or group. It is used to gather the confidential information, fraud and to gain access of the system.

Blurred answer
Students have asked these similar questions
What strategies does a social engineering hacker employ to obtain a user's login ID and password? How would this strategy be different if it was aimed at an administrator's assistant rather than a data-entry clerk?
In order to get access to a user's username and password, a social engineering hacker employs a variety of techniques. As an administrator's assistant, how would this process be different from a data entry clerk's?
What strategies do hackers use in the practise of social engineering in order to get a user's login id and password information?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage