Social Engineering

In essence, social engineering a is simple technique of manipulation: a chosen victim is influenced until it displays a certain desirable behaviour. The attacker usually assumes the identity of someone else – for example a colleague from the IT-department, who asks the victims for their login data. In the run-up of his attack, he may already have collected data about the company and its employees on social media platforms or other sources. He then uses this information in conversations in order to seem trustworthy. The unsuspecting victim discloses sensitive data with which the attacker is potentially able to undermine the entire corporation. If the collected data is used to infiltrate a computer system, the method is called social hacking.

In essence, social engineering a is simple technique of manipulation: a chosen victim is influenced until it displays a certain desirable behaviour. The attacker usually assumes the identity of someone else – for example a colleague from the IT-department, who asks the victims for their login data. In the run-up of his attack, he may already have collected data about the company and its employees on social media platforms or other sources. He then uses this information in conversations in order to seem trustworthy. The unsuspecting victim discloses sensitive data with which the attacker is potentially able to undermine the entire corporation. If the collected data is used to infiltrate a computer system, the method is called social hacking.