Wednesday, September 18, 2019

Cyber Security Tailgating or Piggybacking Eavesdropping Manipulation

Social Engineering is a vast topic due to technology upgradation, how much ever we can do good thing same as evil things are done by attackers.

We are going to most important topic of social engineering.


Tailgating/Piggybacking:
  • Attacker or anyone who want to access illegally walking behind someone having access. 
  • Person comes behind and enter into authorised premises. 
  • Employee or security may be failed to notice or ask identity or identification. 

How To Protect From Tailgating/Piggybacking :
  • Security on duty must be eye's wide open on work premises, so no one enter unauthorised. 
  • Employees should not miss use their ID card and shouldn't allow using his card. 
  • Better surveillance reduces this type of attack. 

Eavesdropping:
  • Eavesdropping is mostly done by CIA and intelligence bureau of any country using technology of lawful intercepts to save country from terrorism. 
  • Unauthorised interception of a private communication. For example Spyware
  • High technology listening device used record conversations. 
  • Its one of the easy methods for hackers. They can consume more time. 

How To Protect From Eavesdropping:
  • Use sound proof conference room to maintain secure and confidential discussion.
  • Listen to your computer by man in middle attack check the settings frequently in computers
  • Avoid public WiFi and hotpots it won't use encryption. So it's not safe. 

Manipulation:
  • Manipulation is a technique used by attacker, attacker use greed and emotional blackmail. 
  • Reciprocity- when you're gifted by some, you need indented to give something to gift giver. 
  • Obligation-attacker need a victim return favour. 
  • Concessions - also requested by attacker
  • Authority - attacker finds the authorization and try to manipulate 
  • Social Manipulation - victim feels the pressure 
  • Attacker play with victim as a doll. 

Hills Station view :



Blog for securing you from modern threats from hackers:

1 comment:

felisha green said...


If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

Email: cybergoldenhacker at gmail dot com

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....