From the course: Ethical Hacking: Footprinting and Reconnaissance (2016)
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Getting social - Linux Tutorial
From the course: Ethical Hacking: Footprinting and Reconnaissance (2016)
Getting social
- [Instructor] Social engineering is influencing someone into giving up sensitive information, and can result in identity theft and data leakage. Today, social engineering is a major threat to the security of an organization, as this information can be used with other hacking techniques to gain access to network resources. Social engineers can include hackers, scam artists, salespeople and ordinary people. Social engineering is accomplished in many ways: telephone, online, dumpster diving, shoulder surfing and simple persuasion. We'll take a look at dumpster diving where someone looks into the trash either outside or inside an organization for something that they might find that's interesting and might reveal sensitive information. That is why any information that is discarded should be protected by shredding. Information such as a list of names and social security numbers, intellectual property, and even hard drives holding digital data. Shoulder surfing is someone who would walk up…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.