Jide cover

Social Engineering- A Manipulative Technique.

April 16, 2025

Social engineering is a manipulation technique that exploits human psychology to gain access to sensitive information, systems, or physical spaces. Unlike traditional hacking, which relies on technical vulnerabilities, social engineering targets

human behavior, trust, and decision-making. Attackers use deception, persuasion, or intimidation to trick individuals into divulging confidential data, granting unauthorized access, or performing actions that compromise security.

 Common Types of Social Engineering Attacks:

1. Phishing**: Sending fraudulent emails, messages, or websites that appear legitimate to trick victims into revealing passwords, credit card numbers, or other sensitive information.

2. Pretexting**: Creating a fabricated scenario (or pretext) to gain trust and extract information. For example, posing as a co-worker or IT support.

3. Baiting**: Offering something enticing (e.g., a free USB drive or download) to lure victims into installing malware or providing information.

4. Tailgating**: Gaining physical access to a restricted area by following an authorized person.

5. Quid Pro Quo**: Offering a service or benefit in exchange for information, such as pretending to provide tech support in return for login credentials.

6. Impersonation**: Pretending to be someone else, like a trusted colleague, executive, or authority figure, to manipulate the victim.

How Social Engineering Works:

– Research**: Attackers gather information about the target (e.g., through social media, public records, or previous interactions)

.

Building Trust**: They establish credibility by impersonating someone familiar or creating a sense of urgency.

Exploitation**: They manipulate the victim into taking an action, such as clicking a link, sharing data, or bypassing security protocols.

Execution**: The attacker achieves their goal, such as stealing data, installing malware, or gaining unauthorized access.

Examples of Social Engineering:

– A hacker sends an email pretending to be from a bank, asking the recipient to “verify” their account details.

– A caller claims to be from IT support and requests remote access to fix a “problem” on the victim’s computer.

– A fake delivery person asks to be let into a secure building.

 How to Protect Against Social Engineering:

1. Be Skeptical**: Verify the identity of anyone requesting sensitive information or access.

2. Educate Employees**: Train staff to recognize and respond to social engineering tactics.

3. Use Multi-Factor Authentication (MFA)**: Add an extra layer of security to accounts.

4. Limit Information Sharing**: Avoid oversharing personal or company details on social media.

5. Implement Security Policies**: Establish protocols for verifying requests and handling sensitive data.

Social engineering is a significant threat because it exploits human nature rather than technical flaws, making it difficult to defend against with technology alone. Awareness and vigilance are key to mitigating these risks.

About the Author

Charles Akinjide Ogunmoriyele is a chemical engineering graduate of Obafemi Awolowo University, Nigeria. He founded Edward Louis Limited, focused on renewable energy, real estate, manufacturing, and cybersecurity. Motivated by a personal incident involving cybercrime in 2018, he pursued cybersecurity education and certifications and now an advocate of cyber security awareness.  He can be reached via email at edwardlouislimited60@gmail.com

PREVIOUS ARTICLES

Password Protection: Your Guide to Staying Safe Online

Identity Theft: What You Need To Know

Essential Tips to Combat ATM Card Scams

Whaling Attacks: The Sophisticated Threat to High-Profile Individuals.

Understanding Phishing and How to Protect Yourself

The Imperative of Cybersecurity Awareness

Kindly share this News

3 Comments

  1. This is a very educative extract which is a cardinal to be security alert & to be cautious in the spirit of sharing information about yourself or organisation in the social pages

  2. This is a very educative extract which is a cardinal to be security alert & to be cautious in the spirit of sharing information about yourself or organisation in the social pages

  3. Very educative, I would have been a victim of impersonation, if I had the greed for get rich quick.

Leave a Reply

Your email address will not be published.

Don't Miss

IMG 20250108 WA0007

El-Rufai, SDP Chairman, Al-Mustapha Hold Strategic Meeting Ahead of 2027 Elections

A high-profile political meeting involving former Kaduna State Governor Nasir
IMG 20250429 WA0001

Agatu Council Issues 48-Hour Ultimatum to Fulani Herders as ECWA Raises Security Alarm

The Chairman of Agatu Local Council in Benue State –