Social Engineering Principles

2 minutes
Share the link to this page
You need to purchase the class to view this lesson.
One-time Purchase
List Price:  $139.99
You save:  $40
List Price:  د.إ514.18
You save:  د.إ146.92
List Price:  A$181.98
You save:  A$51.99
List Price:  ৳11,872.75
You save:  ৳3,392.45
List Price:  CA$178.62
You save:  CA$51.04
CHF 88.77
List Price:  CHF 124.29
You save:  CHF 35.51
List Price:  kr859
You save:  kr245.44
List Price:  €115.50
You save:  €33
List Price:  £102.02
You save:  £29.15
List Price:  HK$1,085.16
You save:  HK$310.07
List Price:  ₹10,221.51
You save:  ₹2,920.64
List Price:  RM566.32
You save:  RM161.82
List Price:  ₦53,336.19
You save:  ₦15,240
List Price:  kr1,206.99
You save:  kr344.87
List Price:  NZ$194.67
You save:  NZ$55.62
List Price:  ₱6,731.95
You save:  ₱1,923.55
List Price:  ₨22,489.39
You save:  ₨6,426
List Price:  S$185.89
You save:  S$53.11
List Price:  ฿4,198.23
You save:  ฿1,199.58
List Price:  ₺1,032.99
You save:  ₺295.16
List Price:  B$756.27
You save:  B$216.09
List Price:  R2,127.09
You save:  R607.78
List Price:  Лв226.18
You save:  Лв64.62
List Price:  ₩154,907.51
You save:  ₩44,262.45
List Price:  ₪457.19
You save:  ₪130.63
Already have an account? Log In


Now, if you look up social engineering and Wikipedia, it says social engineering in the context of information security, which is what we're interested in, refers to psychological manipulation of people into performing actions or divulging confidential information. I'm not saying that's inaccurate, but to me social engineering simply means people tricking people one way or another. Now, social engineering always surprises me because, you know, we're smart people, you know, we're, we've been around the block a little bit. So how does it happen the time after time, smart people figure out how to get passwords, access information, key codes, all kinds of stuff like that, out of otherwise smart people. Well, it boils down to what we call the social engineering principles. These are the aspects of human nature that makes social engineering effective.

So I want to run through all these and let's start with authority. authority to impersonate imply a position of authority. I'm calling from the CEOs office intimidation to frightened by threat. Do I need to talk to your supervisor consensus to convince general group agreement? Bob does that for me all the time scarcity to describe a lack of something These aren't available anywhere else familiarity to imply a closer relationship. Didn't we meet at the holiday party trust to assure reliance on their honesty and integrity.

Anyone here in the IT department can handle that task, urgency to call for immediate action. But web servers about to go down. Now for the exam. Take the time to memorize these different social engineering principles. You're going to be seen lots of questions that discuss these, make sure you're comfortable with them and what they imply

Sign Up


Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.