Chapter 6 - Social Engineering

Summary

Another method cybercriminals use to access confidential information is manipulating people through human interaction.

We’re constantly interacting with others in our daily lives. Social engineering attacks take advantage of channels such as e-mail, phone calls, messaging apps, and social media.

In this chapter, users learn how to exercise caution in order to avoid potential traps curated by social engineering techniques.

Learning objectives

  • Risks associated with the manipulation of legitimate users.
  • Precautions we should take to protect ourselves from manipulation aimed at obtaining confidential information.
  • Tips and tricks for safe social interaction.

Self-assessment questionnaire

This chapter includes 5 self-assessment questions aimed at reinforcing the concepts learned and practiced in the interactive slides.

The self-assessment questions raise issues that require reflection and application of what has been learned.

Duration

  • 20 minutes