This article outlines the threats posed by social engineering attacks, and the role they play in cyber-attacks and cyber security. It defines social engineering and describes some of the techniques and methods used by real-world adversaries. Several case studies are included, covering various types of phishing attack, telephone-based social engineering and in-person, or physical attacks. This article also describes some common steps that organisations can take to reduce the risks posed by social engineering.
Please sign in or register for FREE
Sign in to E&T Cyber Security Hub
Register to E&T Cyber Security Hub
E&T Cyber Security Hub brings together engineers and cyber security specialists to share practical know-how. With content created ‘by engineers, for engineers,’ it provides peer-reviewed technical information, real-world insights, lessons learnt and case studies, as well as tools for networking and knowledge-sharing, profiles of experts and the opportunity for companies to showcase their expertise.