Social Engineering
Majd Abuleil
1 min read


Social engineering involves tricking people into revealing sensitive information, taking certain actions, or making choices that could harm security. It’s like psychological manipulation where attackers exploit human weaknesses instead of relying on technical flaws.
Types of Social Engineering:
Phishing: Sending fraudulent emails, messages, or websites that impersonate legitimate entities to trick individuals into revealing sensitive information such as passwords or financial details.
Pretexting: Creating a fabricated scenario or pretext to gain someone’s trust and extract information or access.
Baiting: Offering something desirable, such as free software or a USB drive, infected with malware to lure victims into compromising their security.
Tailgating: Physically following someone into a restricted area by pretending to be authorized personnel.
Quid Pro Quo: Offering a service or benefit in exchange for sensitive information or access.
Psychological tactics: Social engineering makes use of different strategies rooted in psychology, such as:
Authority: Acting as if you’re an important figure to get people to do what you want.
Reciprocity: Giving something to someone so they feel like they owe you something in return.
Urgency: Creating a sense of urgency or fear to prompt immediate action.
Familiarity: Making people feel comfortable with you by being friendly or acting like you know them.
Curiosity: Getting people interested in something so they’ll want to find out more and do what you want them to do.
Real-World Examples:
Email Phishing: Sending fake emails purportedly from a bank, requesting login credentials.
Phone Scams: Pretending to be a tech support representative and convincing victims to install malware on their computers.
Physical Access: Sneaking into a secure area by following closely behind someone who is authorized to enter, without using proper authorization methods.
Defense Mechanisms:
Awareness and Education: Teaching employees to identify social engineering tricks and to report any strange behavior they notice.
Verification: Encouraging individuals to double-check requests for sensitive information or actions using separate methods
Policy and Procedures: Establishing clear rules and steps for dealing with sensitive information and access requests.
Technical Controls: Using technology like email filters, spam detectors, and multi-factor authentication to prevent social engineering attacks.