Chapter 6 - Social Engineering
There is another way of trying to access confidential information: manipulating people through human interaction.
We all interact every day. Social engineering attacks can use channels such as e-mail, phone calls, messaging applications, social networks, etc.
In this chapter we will learn how to be cautious and not fall into possible traps that use social engineering.
- Risks associated with the manipulation of legitimate users
- What precautions should we take to protect ourselves from manipulation aimed at obtaining confidential information?
- Tips and tricks for safe social interaction
This chapter includes 5 self-assessment questions aimed at reinforcing the concepts learned and practiced in the interactive slides.
The self-assessment questions raise issues that require reflection and application of what has been learned.
- 20 minutes