In our days, respectable people are very difficultbegan to resist scammers, whose activities are supported by so-called social engineering. It takes into account the inherent vulnerability of the ordinary people and dependence on those or other sensations and feelings. Possessing this knowledge, and also having certain skills and technical knowledge, intruders open any doors and overcome all resistance.
Absolutely every person is subject to one or anotherexternal influence, so it is quite possible that someone else has already influenced you who has already mastered social engineering, who has a set of skills in a particular case and an interest in using your property, mind, status or finances. To do this, you are surrounded by skilful, inconspicuous networks of deception and secret espionage. Ordinary-looking people try to enter into you in confidence, which they easily manage thanks to the innate artistry. Then they begin to persuade you in something to provoke fear or panic.
The Internet is most widely distributedsocial engineering. Everyone has an email. We all receive letters asking for access to a service and verifying the accuracy of the data, changing the password. Very often they are sent by scammers. Even if you are not alerted to this newsletter and you want to go to the resource, which the authors are talking about, you still do not enter from the link in their letter, but from the address you use under normal conditions. Scammers often give links to sites that are double, at first glance, no different from the original. Going to such a site, you just give the hacker your data, nothing about it without suspecting.
Social engineering teaches us how to useany opportunities to get interesting data, so when an employee from another department of your company calls and asks for a reminder of the password, enter the password, be sagacious and do not rush to open this information on the phone.
Having opened a computer in your workplace, experiencedthe user and the attacker can easily find an opportunity to go through all the recently opened sites, including payment systems, and copy the data, and then use them. Therefore, if you are away from the workplace for a while, do not find it difficult to install a password on your computer.
According to the rules of the genre of social engineeringrecommends his adherents not to be squeamish and to look more often into drawers of tables, and especially in office urns. It turns out that employees there throw out a lot of valuable information, not to pick up which is just a sin.
Hacking computer systems originate oftennamely with such, at first sight, harmless information. And how easily we throw spoiled, but valuable files into the trash. They are stored in the computer for another month, and in order to view the contents of the basket, you do not need to know the password.
Now we know what social engineering is,and we can resist it. To do this, you should show more distrust towards others, become skeptical and treat all data as if they are being pursued continuously.
</ p>