What is Social Engineering and How to Effectively Prevent It
Beware of social engineering!..
What is social engineering? :
Social engineering is an activity to obtain confidential information by concentrating attacks on the weakest chain of computer network systems, namely humans. No matter how good the security of a platform, protocol, software and hardware, there is nothing that does not involve human interaction.
Social engineering attack is a non-technical attack technique that takes advantage of security holes in a computer system, the worst thing is that this security vulnerability is universal, namely the human factor itself. This can happen because of the interaction between two different users.
The crime of social engineering is to take advantage of the psychological state and psychologically manipulate a person to get as much confidential information as possible, this is done with a human mechanism, namely social interaction. Everyone who physically accesses the system is a threat if that person is not included in the security policy that has been made, in the sense that someone who tries to access a problem but in fact that person is not part of the problem, then that person is a threat.
How does one do social engineering activities?.
A social engineer studies a person’s emotions with certain interactions to see the emotional reactions of the victims. By studying the victim’s emotions, a social engineer knows the gaps that can be infiltrated.
These are some of the human weak points that a social engineer can take advantage of, including:
1. Fear: if a student or student is asked for data or information from seniors, seniors, or other law enforcers, usually the person concerned will immediately give it without feeling shy; (yr art)
2. Trust: if an individual is asked for data or information from a good friend, relative, website, or a website, the person concerned will usually provide it immediately without feeling suspicious. Or someone gives
the information concerned immediately believes without validating the information.
where and who can be social engineering? : anywhere, and anytime, it’s just that sometimes we ourselves don’t realize it (yr art) . anyone can take advantage of social engineering as an attack, but social engineering in general often occurs on social media. The general actors of social engineering are as follows:
Script kiddies: Unskilled hackers who use simple techniques.
Insiders: While they may not have strong technical skills, their access to sensitive networks is a risk.
Hacktivists: Hacktivism is a combination of politics, the Internet, and other elements. Activism, a political movement that emphasizes direct action, was the inspiration, for hacktivism.
Lone hackers: Their skills or motivations vary. But of course to make a profit.
Organized organizations: Criminal syndicates formed to commit cyber crimes.
Government Hackers: These perpetrators are cyberthreat highest and consistent level for country governments and a very high level of risk
Terrorist groups: The Center for Internet Security services writes that hackers skilled in these groups are rare but the threat is likely to become more significant in the next one to three years .
How to avoid the crime of social engineering?…
– validate a news information obtained from the media or from other people,
– secure personal data, email, cellphone number and other important data,
-restrict everyone you don’t knowin accessing problems,
Don’t easily trust people you don’t know or just know.
– Avoid suspicious interactions, be it on social media or in new environments.
No single network system is secure, no matter how good the security system is,
Then it will not be completely safe as long as it still involves human interaction. Stay Alert social engineering: the art of human hacking.
May be useful