Page 3 - CPTE_Prep_Guide_Sample
P. 3

information or getting them to do something
                   that is against typical policies. A hacker can
                   obtain information about a target from the
                   internet, new papers, employees, employee
                   family members, consultants, vendors,
                   customers, and security experts.

                   Social Engineering Techniques

                   The following are techniques that might be
                   used by an attacker in order to gain access to a
                   company:

                       •  Authority
                              o  Attackers pose as victim’s boss,
                                 boss’s secretary, or other
                                 company leadership
                       •  Strong Emotion
                              o  Get victim into heightened
                                 emotional state so they don’t
                                 pay as much attention to the
                                 details/facts
                       •  Overloading
                              o  Provide more information than
                                 target can handle so wrong
                                 statements go unnoticed
                       •  Reciprocation
                              o  If a stranger does you a favor,
                                 then asks you for a favor, don’t
                                 reciprocate without thinking






                                                               408
   1   2   3   4   5   6   7   8