From the course: Ethical Hacking: Footprinting and Reconnaissance (2016)

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Getting social

Getting social - Linux Tutorial

From the course: Ethical Hacking: Footprinting and Reconnaissance (2016)

Start my 1-month free trial

Getting social

- [Instructor] Social engineering is influencing someone into giving up sensitive information, and can result in identity theft and data leakage. Today, social engineering is a major threat to the security of an organization, as this information can be used with other hacking techniques to gain access to network resources. Social engineers can include hackers, scam artists, salespeople and ordinary people. Social engineering is accomplished in many ways: telephone, online, dumpster diving, shoulder surfing and simple persuasion. We'll take a look at dumpster diving where someone looks into the trash either outside or inside an organization for something that they might find that's interesting and might reveal sensitive information. That is why any information that is discarded should be protected by shredding. Information such as a list of names and social security numbers, intellectual property, and even hard drives holding digital data. Shoulder surfing is someone who would walk up…

Contents