SLAC Computer Security
Search SLAC

Computer Security News You Can Use (at Home too)

Title: Top 10 Social Engineering Tactics

Author: Andrew Whitaker

Source: informIT

Date Published: 11th June 2009




'....The easiest way to get into a computer system is to simply ask permission. At the end of the day, no matter how much encryption and security technology you have implemented, a network is never completely secure.


You can never get rid of the weakest link-the human factor. It does not matter how many firewalls, virtual private networks (VPNs), or encryption devices you have if your employees are willing to give access to the systems to anyone who asks for it.


A social engineer is someone who uses deception, persuasion, and influence to get information that would otherwise be unavailable. To social engineers, the fact that "there is a sucker born every minute" gives them the opportunity to circumvent some of the most secure data centers in the world.


Social engineering is more than just being a con artist; it is about understanding human psychology and having a methodical way of influencing someone to either give out sensitive information or grant you unauthorized access. In other words, it is not about being a good liar; it is about being an engineer who discovers ways to manipulate people for his or her advantage.


Social engineers use many techniques to reach their goals. This article outlines 10 of what I consider to be the most popular......'


To read the complete article see:

Owner: SLAC Computer Security
Last Updated: 07/22/2010
Feedback: Please send to
Computer Security Feedback