Chapter 10Social engineering forensics
Introduction
Social engineering refers to the manipulation of people into releasing information or performing an action. The result of the manipulation is a direct loss of information by the company and/or the achievement of some action that is desired by the social engineering attacker such as access to computer networks. This chapter discusses the main attack vectors commonly used by social engineers: online, telephone, waste management, mobile devices, personal approaches, and reverse social engineering. It also discusses commonly used social engineering methods. When investigating social engineering incidents, certain steps should be followed by the forensic investigator. The first step to investigating ...
Get Digital Forensics Explained, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.