• Courses
          • IT Training

          • Microsoft
          • Azure
          • Office 365
          • Microsoft Office Specialist
          • Amazon - AWS
          • Linux
          • Cisco
          • Desktop
          • Fortinet
          • MikroTik
          • VoIP
          • CyberSecurity
          • Programming Languages
          • Databases
          • Machine Learning / Analytics
          • Azure
          • GDPR
          • Blockchain and Cryptocurrency
          • PECB
          • HRDA INSTRUCTOR (EEK)
          • Business Training

          • ISO 13053 Six Sigma Methodology Trainings
          • Managing Projects with Microsoft Project Management
          • Microsoft Advanced Excel
          • Analyzing Data with Microsoft Power BI
          • GDPR DPO
          • Social Media
          • Six Sigma: Total Quality Applications
          • Online Courses – Learn Anything, On Your Schedule

          • Top Self Paced Courses
          • Accredited Diplomas

          • IT and Computing
          • Sales and Marketing
          • Human Resource
          • Business Management
          • Leadership and Team Working
    • Upcoming Courses
    • Corporate Training
    • About Us
      • Contact
    • Resources
      • Blog
      • Free Courses
    • Career
      • Jobs at SCP
      • IT Jobs
      • Are you linked-in?
      • Career Service
    • Erasmus +
      • Erasmus KA2
      • Erasmus Mobilities
        • Erasmus Courses
        • Erasmus+ Full Package
        • Gallery – Erasmus+
      • Apply with us!
    Have any question?

    70008828
    academy@scp.ac.cy
    Login
    SCP Academy
      • Courses
            • IT Training

            • Microsoft
            • Azure
            • Office 365
            • Microsoft Office Specialist
            • Amazon - AWS
            • Linux
            • Cisco
            • Desktop
            • Fortinet
            • MikroTik
            • VoIP
            • CyberSecurity
            • Programming Languages
            • Databases
            • Machine Learning / Analytics
            • Azure
            • GDPR
            • Blockchain and Cryptocurrency
            • PECB
            • HRDA INSTRUCTOR (EEK)
            • Business Training

            • ISO 13053 Six Sigma Methodology Trainings
            • Managing Projects with Microsoft Project Management
            • Microsoft Advanced Excel
            • Analyzing Data with Microsoft Power BI
            • GDPR DPO
            • Social Media
            • Six Sigma: Total Quality Applications
            • Online Courses – Learn Anything, On Your Schedule

            • Top Self Paced Courses
            • Accredited Diplomas

            • IT and Computing
            • Sales and Marketing
            • Human Resource
            • Business Management
            • Leadership and Team Working
      • Upcoming Courses
      • Corporate Training
      • About Us
        • Contact
      • Resources
        • Blog
        • Free Courses
      • Career
        • Jobs at SCP
        • IT Jobs
        • Are you linked-in?
        • Career Service
      • Erasmus +
        • Erasmus KA2
        • Erasmus Mobilities
          • Erasmus Courses
          • Erasmus+ Full Package
          • Gallery – Erasmus+
        • Apply with us!

      Blog

      • Home
      • Blog
      • Hacking without Computers – An introduction to Social Engineering

      Hacking without Computers – An introduction to Social Engineering

      • Posted by admin
      • Date August 29, 2020
      Hacking without Computers – An introduction to Social Engineering

      Social engineering is one of the well-known manipulation techniques that exploits human error to gain access to enterprises or private data. In the internet crime, these “human hacking” scams tend to lure unsuspecting users into exposing information, spreading malware infections, or giving access to restricted systems. Attacks can happen online, in-person, and via different interactions.

      Scams created by social engineering are engineered around how people feel and act. As such, social engineering attacks are particularly helpful for manipulating a user’s behaviour. Once the attacker understands what motivates a user’s actions, they will deceive and manipulate the user effectively.
      In addition, hackers try to exploit a user’s lack of cybersecurity knowledge in that way some customers and employees fall in to certain threats, an example is the drive-by downloads in which a user will download a software for free but the particular software has hidden malware.

      Generally, social engineering attackers have the below goals:
      • Sabotage: Disrupting or corrupting information to cause damage.
      • Theft: getting valuables like data, access to systems, or money.

      To better understand social engineering, it will be better if we check its lifecycle and how it works:

      Most social engineering attacks focus on the real communication between the attacker and the victim. The attacker tends to encourage the user into a real human communication rather that trying to find exploitations or vulnerabilities to hack the systems.

      The attack cycle provides cyber-criminals a method for deceiving you. The below steps are usually used in the social engineering attack cycle:

      • Information gathering of the victim or information of a bigger group the victim is member of.
      • Attacker will try to create a relationship or initiate online or offline an interaction with the victim to build trust.
      •  Exploit victims information once trust is build and then find the weaknesses that will help him with the attack.
      •  Once all the necessary information is gathered the attacker will of course disengage the victim and cannot be found ever again offline or online.

      Last but not least the attacker will try to gather as many information in every single email or in a series of social media chats or even in a face-to-face communication, for months or even sometimes for years.

      Tips on how to spot social engineering attempt and examples on how they give the impression of being a legitimate user, you’ll find in our next blog spot.

      For now, keep in mind that social engineering is a form of attack and that most of the times will not even use technology to gather information.

      Stay safe and always use backups 😊

      Get our latest posts and trainings right in your Inbox.






        • Share:
        author avatar
        admin

        Previous post

        Digital Transformation toolkit
        August 29, 2020

        Next post

        Python is the Essential Programming Language of Data Science
        October 15, 2020

        You may also like

        Cisco Training Cyprus
        Cisco Training Cyprus – Achieving Cisco Routing and Switching Certification
        12 November, 2022
        SCP Academy – for Python Training in Cyprus
        SCP Academy – For Python Training in Cyprus
        6 April, 2022
        MTCNA Training
        Register SCP Academy For MTCNA Training in Cyprus
        25 March, 2022
        Introduction to Cybersecurity

        Introduction to Cybersecurity

        Free
        CCNA Routing & Switching V7.0

        CCNA Routing & Switching V7.0

        Free
        Microsoft Office 365 – End User

        Microsoft Office 365 – End User

        Free

        Designed by SCP Academy.

        Login with your site account

        No apps configured. Please contact your administrator.

        Lost your password?