Social engineering: Difference between revisions
imported>Jean Gebarowski mNo edit summary |
imported>Joe Quick m (subpages) |
||
Line 1: | Line 1: | ||
{{subpages}} | |||
'''Social engineering''' is a discipline aiming at gathering information from any social element involved in a social activity (generally a human being), often used in a [[cybercrime]]. People using that technique try to exploit a ''weakness'', like in a software or an operating system, to collect valuable information. Human beings are often more vulnerable than computer systems, mainly because of lack of education. | '''Social engineering''' is a discipline aiming at gathering information from any social element involved in a social activity (generally a human being), often used in a [[cybercrime]]. People using that technique try to exploit a ''weakness'', like in a software or an operating system, to collect valuable information. Human beings are often more vulnerable than computer systems, mainly because of lack of education. | ||
Line 4: | Line 5: | ||
The goal of the ''social attacker'' can be slandering, phishing, competition, glory, competitive advantage or any motivation. | The goal of the ''social attacker'' can be slandering, phishing, competition, glory, competitive advantage or any motivation. | ||
Revision as of 22:27, 21 December 2007
Social engineering is a discipline aiming at gathering information from any social element involved in a social activity (generally a human being), often used in a cybercrime. People using that technique try to exploit a weakness, like in a software or an operating system, to collect valuable information. Human beings are often more vulnerable than computer systems, mainly because of lack of education.
Phishing is a very basic technique of social engineering, where the victim gives credentials to someone that seems to be an trustable interlocutor. An other common technique of social engineering is to find answers to security tips, added to ensure some privacy protection especially in many web sites, elsewhere like in a chat session.
The goal of the social attacker can be slandering, phishing, competition, glory, competitive advantage or any motivation.