Driving Behavioral Change for Information Management through Data-Driven Gree...
Social Engineering
1.
2.
3.
4.
5. Used social engineering sometimes within
the fraud the Internet to achieve the
intended purpose of the victim, where the
primary purpose of social engineering is
to ask simple questions or trivial )by
phone or e-mail with the impersonate an
authority or of the work allows him to
ask such questions without raising
.)suspicion
6. The advantages of knowing how social
engineering techniques are effective
:include
• prevents unauthorized access from
occurring
• prevents possible information theft
• prevents the possibility of downloading
malicious software on unsuspecting user
systems
• preserves the integrity of information
systems
7. The disadvantages of being uninformed
with respect to social engineering
:techniques include
• possible data theft )bank account
numbers, social security numbers, user
IDs/passwords, etc.)
• possible identity theft
• possible corruption of data
• possible unplanned system downtime
• possible )physical) security threat