Social Engineering is a vast topic due to technology upgradation, how much ever we can do good thing same as evil things are done by attackers.
We are going to most important topic of social engineering.
Tailgating/Piggybacking:
How To Protect From Tailgating/Piggybacking :
Eavesdropping:
How To Protect From Eavesdropping:
Manipulation:
Hills Station view :
We are going to most important topic of social engineering.
Tailgating/Piggybacking:
- Attacker or anyone who want to access illegally walking behind someone having access.
- Person comes behind and enter into authorised premises.
- Employee or security may be failed to notice or ask identity or identification.
- Security on duty must be eye's wide open on work premises, so no one enter unauthorised.
- Employees should not miss use their ID card and shouldn't allow using his card.
- Better surveillance reduces this type of attack.
- Eavesdropping is mostly done by CIA and intelligence bureau of any country using technology of lawful intercepts to save country from terrorism.
- Unauthorised interception of a private communication. For example Spyware
- High technology listening device used record conversations.
- Its one of the easy methods for hackers. They can consume more time.
- Use sound proof conference room to maintain secure and confidential discussion.
- Listen to your computer by man in middle attack check the settings frequently in computers
- Avoid public WiFi and hotpots it won't use encryption. So it's not safe.
- Manipulation is a technique used by attacker, attacker use greed and emotional blackmail.
- Reciprocity- when you're gifted by some, you need indented to give something to gift giver.
- Obligation-attacker need a victim return favour.
- Concessions - also requested by attacker
- Authority - attacker finds the authorization and try to manipulate
- Social Manipulation - victim feels the pressure
- Attacker play with victim as a doll.
1 comment:
If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest
Email: cybergoldenhacker at gmail dot com
Post a Comment