ICT Frame

Social Engineering psychological manipulation of its Types

Social engineering is a non-technical method of intrusion hackers which relies heavily on human interaction and often involves tracing people and breaking standard security procedure. It is one of the significant threat for the user, and mainly social engineers encounter the networking enterprises.

Uses of Social Engineering

Virus writer

Virus writer mainly used malware-laden and email attachment. This is protective, and the phishers use a social engineer to developed sensitive which scares the vendor did.

Scareware

Scareware is used by the fighter people into running software, and they will directly hit the running software and make them protective and protect their asses and dangerous at worst.

Social engineers run a device called con game which is naturally helpful and take the quick action and have the immediate network access.

Types of Social Engineering

  1. Baiting

Baiting helps to leave malware from the external device such as USB flash drive and CD ROM.

  1. Phishing

It’s mainly legitimate email which often purporting the malware.

  1. Pro texting

Protesting helps to gain free data.

  1. Quid pro Quo

Its mainly request personal information and to give the identity to be shown by the recipient.

  1. Spam

Spam means unsolicited junk email.

  1. Spear phishing

Spear phishing means phis es tailored for a spy organization.

  1. Tailgating

Tailgating is an unauthorized follow authorized party which steal valuable property.