💡 Learn from AI

Introduction to Social Engineering

The Psychology of Social Engineering

Social Engineering

Social engineering is a psychological technique that cybercriminals use to manipulate people into divulging sensitive information or performing actions they wouldn't usually do. In this lesson, we will discuss the vulnerabilities that cybercriminals exploit in social engineering attacks.

Trust

One of the most common vulnerabilities that cybercriminals exploit is trust. People are naturally trusting of others, especially those in positions of authority, and will often do what they are told without question. For example, a cybercriminal might call an employee pretending to be an IT support technician and ask for their login credentials. Because the employee trusts that the caller is legitimate, they give them the information they need to access sensitive data.

Fear

Another vulnerability that cybercriminals exploit is fear. People are naturally afraid of negative consequences, such as losing their job or being fined. Cybercriminals will use this fear to their advantage by threatening their victims with these consequences if they don't comply with their demands. For example, a cybercriminal might send an email to an employee threatening to report them to their supervisor if they don't click on a link or download an attachment.

Desire to Help

Finally, cybercriminals will often exploit people's desire to be helpful. People want to help others, especially those in need, and will often go out of their way to do so. Cybercriminals will use this desire to their advantage by pretending to be in need and asking their victims for help. For example, a cybercriminal might call an employee pretending to be a lost tourist and ask for directions to a certain location. While the employee is distracted, the cybercriminal might steal their credentials or plant malware on their computer.

Take quiz (4 questions)

Previous unit

The Definition of Social Engineering

Next unit

Types of Social Engineering Attacks

All courses were automatically generated using OpenAI's GPT-3. Your feedback helps us improve as we cannot manually review every course. Thank you!