Common info collection technique
Introduction ⭐ >Who are these adversaries? They may be competitors, criminals, spies, unhappy employees, terrorists, or troublemakers. They may be motivated by money, revenge, or political beliefs, to name a few. There are numerous ways adversaries collect information. Some of the more common methods include social engineering, phishing, accidental disclosure, googling, and dumpster diving. These methods are described over the next few pages followed by some basic countermeasures. Social Engineering👪 Social engineering is a collection of techniques used to manipulate people into revealing sensitive or other critical information. Those who engage in social engineering rely on the humans’ natural tendency to trust. In fact, it’s often easier for an adversary to obtain information by simply asking the right questions than using technical hacking methods. Social engineering is sometimes conducted by phone. The caller may pretend to be someone in a position of authority or a telephone or computer technician, gradually pulling information out of the targeted person. Often the adversary will call several employees and piece together enough information to launch an attack. Help desk employees are often targeted by an adversary because they’re trained to be friendly and provide information. Social engineering can also occur through online social forums, at professional conferences, and at non-work social events, to name a few examples. The first objective of an adversary attempting social engineering is to convince you that they are in fact a person that you can trust with critical information. Phishing Phishing scams may be the most common types of social engineering attacks used today. Most phishing scams demonstrate the following characteristics: ...