The Art of Social Engineering: Explained

What are examples of social engineering?

Which of the following are examples of social engineering? (select two)

  • a. Dumpster diving
  • b. War dialing
  • c. Port scanning
  • d. Shoulder surfing

Examples of Social Engineering

The examples of social engineering are:

  • a. Dumpster diving: It involves searching through a target's garbage or recycling bins to obtain information that can be used to gain unauthorized access to a system or network.
  • d. Shoulder surfing: It involves looking over someone's shoulder to obtain sensitive information, such as passwords or PIN numbers, that can be used to gain unauthorized access to a system or network.

Social engineering is a tactic used by hackers to manipulate individuals into divulging confidential information that can be used to access systems or networks. It often involves psychological manipulation rather than technical means.

Dumpster diving is a technique where hackers rummage through garbage or recycling bins to find documents, passwords, or other information that could be helpful in gaining unauthorized access. This method takes advantage of people's tendency to discard sensitive information without proper care.

Shoulder surfing, on the other hand, is a technique where hackers observe individuals entering passwords, PIN numbers, or other sensitive information by looking over their shoulders. This method relies on being physically close to the target and can be done in crowded public places, like cafes or airports.

War dialing and port scanning, while related to security breaches, are not considered examples of social engineering. War dialing involves dialing a large number of phone numbers to find modems that can be exploited for unauthorized access. Port scanning, on the other hand, involves scanning a computer system or network for open ports that can be used to gain unauthorized access.

Understanding these social engineering techniques is crucial for individuals and organizations to protect themselves from cyber threats. By being aware of these tactics, people can take proactive measures to safeguard their sensitive information and prevent unauthorized access.

← Aceable defensive driving app icon explained Problem 5 computing grain diameter after heat treatment →