• Home
    • About Us
      • Contact
    • Courses
          • IT Training

          • Microsoft
          • Azure
          • Office 365
          • Microsoft Office Specialist
          • Amazon - AWS
          • Linux
          • Cisco
          • Desktop
          • Fortinet
          • MikroTik
          • VoIP
          • CyberSecurity
          • Programming Languages
          • Databases
          • Machine Learning / Analytics
          • Azure
          • GDPR
          • Blockchain and Cryptocurrency
          • PECB
          • HRDA INSTRUCTOR (EEK)
          • Business Training

          • ISO 13053 Six Sigma Methodology Trainings
          • Managing Projects with Microsoft Project Management
          • Microsoft Excel Expert
          • Analyzing Data with Microsoft Power BI
          • GDPR DPO
          • Social Media
          • Six Sigma: Total Quality Applications
          • Professional Scrum Master I
          • Accredited Diplomas

          • IT and Computing
          • Sales and Marketing
          • Human Resource
          • Business Management
          • Leadership and Team Working
          • E-Learning

          • Online courses
    • Training Calendar
    • Resources
      • Blog
      • Free Courses
    • Company Training
    • Career
      • IT Jobs
      • Are you linked-in?
      • Career Service
    • Erasmus
    Have any question?

    70008828
    academy@scp.ac.cy
    Login
    SCP Academy
      • Home
      • About Us
        • Contact
      • Courses
            • IT Training

            • Microsoft
            • Azure
            • Office 365
            • Microsoft Office Specialist
            • Amazon - AWS
            • Linux
            • Cisco
            • Desktop
            • Fortinet
            • MikroTik
            • VoIP
            • CyberSecurity
            • Programming Languages
            • Databases
            • Machine Learning / Analytics
            • Azure
            • GDPR
            • Blockchain and Cryptocurrency
            • PECB
            • HRDA INSTRUCTOR (EEK)
            • Business Training

            • ISO 13053 Six Sigma Methodology Trainings
            • Managing Projects with Microsoft Project Management
            • Microsoft Excel Expert
            • Analyzing Data with Microsoft Power BI
            • GDPR DPO
            • Social Media
            • Six Sigma: Total Quality Applications
            • Professional Scrum Master I
            • Accredited Diplomas

            • IT and Computing
            • Sales and Marketing
            • Human Resource
            • Business Management
            • Leadership and Team Working
            • E-Learning

            • Online courses
      • Training Calendar
      • Resources
        • Blog
        • Free Courses
      • Company Training
      • Career
        • IT Jobs
        • Are you linked-in?
        • Career Service
      • Erasmus

      Blog

      • Home
      • Blog
      • Hacking without Computers – An introduction to Social Engineering

      Hacking without Computers – An introduction to Social Engineering

      • Posted by admin
      • Date August 29, 2020
      Hacking without Computers – An introduction to Social Engineering

      Social engineering is one of the well-known manipulation techniques that exploits human error to gain access to enterprises or private data. In the internet crime, these “human hacking” scams tend to lure unsuspecting users into exposing information, spreading malware infections, or giving access to restricted systems. Attacks can happen online, in-person, and via different interactions.

      Scams created by social engineering are engineered around how people feel and act. As such, social engineering attacks are particularly helpful for manipulating a user’s behaviour. Once the attacker understands what motivates a user’s actions, they will deceive and manipulate the user effectively.
      In addition, hackers try to exploit a user’s lack of cybersecurity knowledge in that way some customers and employees fall in to certain threats, an example is the drive-by downloads in which a user will download a software for free but the particular software has hidden malware.

      Generally, social engineering attackers have the below goals:
      • Sabotage: Disrupting or corrupting information to cause damage.
      • Theft: getting valuables like data, access to systems, or money.

      To better understand social engineering, it will be better if we check its lifecycle and how it works:

      Most social engineering attacks focus on the real communication between the attacker and the victim. The attacker tends to encourage the user into a real human communication rather that trying to find exploitations or vulnerabilities to hack the systems.

      The attack cycle provides cyber-criminals a method for deceiving you. The below steps are usually used in the social engineering attack cycle:

      • Information gathering of the victim or information of a bigger group the victim is member of.
      • Attacker will try to create a relationship or initiate online or offline an interaction with the victim to build trust.
      •  Exploit victims information once trust is build and then find the weaknesses that will help him with the attack.
      •  Once all the necessary information is gathered the attacker will of course disengage the victim and cannot be found ever again offline or online.

      Last but not least the attacker will try to gather as many information in every single email or in a series of social media chats or even in a face-to-face communication, for months or even sometimes for years.

      Tips on how to spot social engineering attempt and examples on how they give the impression of being a legitimate user, you’ll find in our next blog spot.

      For now, keep in mind that social engineering is a form of attack and that most of the times will not even use technology to gather information.

      Stay safe and always use backups 😊

      Get our latest posts and trainings right in your Inbox.






        • Share:
        author avatar
        admin

        Previous post

        Digital Transformation toolkit
        August 29, 2020

        Next post

        Python is the Essential Programming Language of Data Science
        October 15, 2020

        You may also like

        SCP Academy – for Python Training in Cyprus
        SCP Academy – For Python Training in Cyprus
        6 April, 2022
        MTCNA Training
        Register SCP Academy For MTCNA Training in Cyprus
        25 March, 2022
        Is Microsoft Azure Training Cyprus Worth It?
        5 March, 2022

        Do you want to become an Azure expert and make better use of the tools Microsoft Azure offers? Our Microsoft Azure training Cyprus can help you get there. Cloud computing …

        Introduction to Cybersecurity

        Introduction to Cybersecurity

        Free
        CCNA Routing & Switching V7.0

        CCNA Routing & Switching V7.0

        Free
        350-401 ENCOR Implementing and Operating Cisco Enterprise Network Core Technologies

        350-401 ENCOR Implementing and Operating Cisco Enterprise Network Core Technologies

        €930.00

        Designed by SCP Academy.

        Login with your site account

        No apps configured. Please contact your administrator.

        Lost your password?