Skip to Main Content
Cybersecurity and Privacy Law Handbook
book

Cybersecurity and Privacy Law Handbook

by Walter Rocchi
December 2022
Beginner to intermediate content levelBeginner to intermediate
230 pages
6h 32m
English
Packt Publishing
Content preview from Cybersecurity and Privacy Law Handbook

9

Social Engineering, Password Guidance, and Policy

While in the previous chapter we got an in-depth look into policies and procedures, now we are going to understand the most powerful attack vector: social engineering. Why is it the most powerful? Mainly because it attacks the weakest link of the security chain: humans. While a machine (software) is intended to execute commands and orders, we use our intelligence, feelings, and so on to interact with others. But it’s the interaction with other human beings to make us behave differently and in a less secure way.

In this chapter, we will cover the following topics:

  • The starting point
  • Common social engineering attack methods
  • Have you got a M.A.P.P.?

The starting point

The internet has become ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Privacy, Regulations, and Cybersecurity

Privacy, Regulations, and Cybersecurity

Chris Moschovitis

Publisher Resources

ISBN: 9781803242415