Social engineering is a non-technical method of intrusion hackers which relies heavily on human interaction and often involves tracing people and breaking standard security procedure. It is one of the significant threat for the user, and mainly social engineers encounter the networking enterprises.
Uses of Social Engineering
Virus writer
Virus writer mainly used malware-laden and email attachment. This is protective, and the phishers use a social engineer to developed sensitive which scares the vendor did.
Scareware
Scareware is used by the fighter people into running software, and they will directly hit the running software and make them protective and protect their asses and dangerous at worst.
Social engineers run a device called con game which is naturally helpful and take the quick action and have the immediate network access.
Types of Social Engineering
- Baiting
Baiting helps to leave malware from the external device such as USB flash drive and CD ROM.
- Phishing
It’s mainly legitimate email which often purporting the malware.
- Pro texting
Protesting helps to gain free data.
- Quid pro Quo
Its mainly request personal information and to give the identity to be shown by the recipient.
- Spam
Spam means unsolicited junk email.
- Spear phishing
Spear phishing means phis es tailored for a spy organization.
- Tailgating
Tailgating is an unauthorized follow authorized party which steal valuable property.