Have a Question?
-
General Security FAQs
- How do I stop phone scams?
- What does cyber security training involve?
- Why do businesses need cyber security training?
- Do I need antivirus on my mobile phone?
- Where Can I Get Free Cyber Security Advice?
- Are security assessments needed within education settings?
- Do I need to worry about security of cloud-based systems we use?
- I have anti-virus software do I need more than this?
- We’re a small company do we need to worry about cyber security?
-
Our Services
-
Securing your business
- What does cyber security training involve?
- Why do businesses need cyber security training?
- How do I secure Amazon Web Services?
- How can we secure Google Workspace (G-Suite)?
- What is the Best Antivirus Software?
- Who Should Be Responsible for Security in a Business?
- What is Microsoft SecureScore?
- What Does a Virtual CISO Do?
- How Secure Are Chromebooks?
- Can I Use the Same Password Everywhere?
- What is a Vulnerability Assessment?
- What is Disaster Recovery?
- How Long Should My Password Be?
- What is a Password Manager?
- How Often Should I Change My Password?
- What is a Business Continuity Plan?
- Show all articles ( 1 ) Collapse Articles
-
Standards & Frameworks
- Does ISO 27001 Cover GDPR?
- What is HIPAA?
- What is PCI DSS?
- How is Cyber Essentials Assessed?
- What are the ISO 27001 Controls?
- How Long Are Cyber Essentials Certificates Valid For?
- Does Cyber Essentials Cover GDPR?
- What is Cyber Essentials?
- What is the Difference Between Cyber Essentials and Cyber Essentials PLUS?
- What are the benefits of ISO 27001?
- What is ISO 27001?
-
Laws & Regulations
-
Cyber Security Glossary
- What is Tailgaiting?
- What is PreTexting?
- What is Scareware?
- What is Baiting?
- What is Penetration Testing?
- What is Ethical Hacking?
- What is XSS?
- What is WAF?
- What is VPN?
- What is TVM?
- What is SSO?
- What is SQLI?
- What is SOAR?
- What is SIEM?
- What is RBAC?
- What is RAT?
- What is PCI-DSS?
- What is OSINT?
- What is NIST?
- What is NCSC?
- What is MFA?
- What is MAC?
- What is ISO?
- What is IPS?
- What is IOT?
- What is IOC?
- What is IDS?
- What is HTTPS?
- What is HIPAA?
- What is GDPR?
- What is EDR?
- What is DLP?
- What is DDoS?
- What is DOS?
- What is DAC?
- What is CVSS?
- What is CND?
- What is CISSP?
- What is CISO?
- What is the CIA Triad?
- What is AV?
- What is AC?
- What is APT?
- What is 2FA?
- What is a Virtual CISO or vCISO?
- What is Blue Teaming?
- What is Purple Teaming?
- What is a Zero-Day Vulnerability?
- What is a Zero-Day Attack?
- What is XSS (Cross-Site Scripting)?
- What is a Worm?
- What is White Teaming?
- What is Whaling?
- What is a Watering Hole Attack?
- What is Vulnerability?
- What is a VPN (Virtual Private Network)?
- What is a Virus?
- What is URL Injection?
- What is a Trojan?
- What is a Threat Actor?
- What is Steganography?
- What is SQL Injection?
- What is Spyware?
- What is Website Spoofing?
- What is Spear-Phishing?
- What is Spam?
- What is Social Engineering?
- What is Smishing?
- What is Single Sign-On (SSO)?
- What is Sextortion?
- What is a Sandbox?
- What is Salting?
- What is an RPO (Recovery Point Objective)?
- What is a Rootkit?
- What is a Remote Access Trojan (RAT)?
- What is Red Teaming?
- What is Ransomware?
- What is PII (Personally Identifiable Information)?
- What is a firewall?
- What is "cyber security"?
- Show all articles ( 65 ) Collapse Articles
-
Cyber Threats
What is Social Engineering?
Created On
Last Updated On
byadmin
0 out of 5 stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |
You are here:
< All Topics
In many instances, malicious cyber actors widely use social engineering to enhance malware attacks. In the context of information security, social engineering is defined as the psychological manipulation of computer users by taking advantage of security vulnerabilities and tricking them into installing malware or disclosing personal information. It is important to note that this is different from social engineering in the context of social sciences. Cyber security experts consider this a non-technical strategy employed by cyber-criminals who rely on human interaction to access user information. If this strategy is successful, it provides the attacker with authorised and legitimate access to confidential user data.
Was this article helpful?
0 out of 5 stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |