Systems and Security : Attacks, Threats, and Vulnerabilities
1.1 Security Threats – Social Engineering Techniques
Social engineering is a type of attack that relies on exploiting human psychology in order to gain unauthorized access to systems, networks, or sensitive information. There are several principles that attackers may use in social engineering attacks, including:
1. Authority: People tend to trust individuals who appear to be in positions of authority, such as police officers, executives, or IT personnel. Attackers may use this principle by pretending to be a trusted authority figure in order to trick the target into revealing sensitive information or performing actions that compromise security.
2. Intimidation: Attackers may use fear or intimidation to manipulate the target into taking a certain action. For example, they may threaten to harm the target or their loved ones if they don't comply with their demands.
3. Consensus: People tend to conform to the behavior of those around them. Attackers may exploit this principle by creating a false sense of consensus, such as by posing as multiple people who all support a particular action.
4. Scarcity: People are more likely to take action when they believe that something is in short supply or will become unavailable soon. Attackers may use this principle by claiming that a certain product, service, or information is only available for a limited time, in order to trick the target into taking immediate action.
5. Familiarity: People tend to trust individuals and organizations that they are familiar with. Attackers may exploit this principle by posing as a familiar individual, such as a friend or coworker, or by using a familiar logo or brand to create a sense of trust.
6. Trust: People are more likely to trust others who appear to be honest, trustworthy, and transparent. Attackers may use this principle by creating a false sense of trust, such as by using a fake name or profile, or by posing as a charity or other trustworthy organization.