DefineSecurity Social Engineering Assessment Services
Social Engineering relies on a set of technological, psychological, and physical techniques that trick a user into breaking security protocols.
These techniques include:
- Phishing – Phishing occurs when an attacker masquerades as a credible source, and sends an email requesting that a user performs an action (ex: clicks a URL, or opens an attachment) and conveys confidential information. Spear-Phishing is similar, but the attacker targets specific individuals and includes relevant information to appear even more convincing.
- Vishing – Malicious attackers will attempt to call various individuals or groups to gather information about a target or in order to influence an action. For example, a common scenario would involve a hacker calling a help-desk to request that a new account be created.
- Impersonation – Pretexting as another person or presenting a false identity can allow an attacker to gain access to information, facilities, or secure systems.