{"id":14257,"date":"2023-10-31T16:41:39","date_gmt":"2023-10-31T22:41:39","guid":{"rendered":"https:\/\/gsb.lat\/?p=14257"},"modified":"2023-10-31T17:33:56","modified_gmt":"2023-10-31T23:33:56","slug":"social-engineering","status":"publish","type":"post","link":"https:\/\/gsb.lat\/en\/social-engineering\/","title":{"rendered":"Social Engineering"},"content":{"rendered":"<p>Social engineering is a set of techniques used by cybercriminals to trick unsuspecting users into sending them sensitive data, infecting their computers with malware or opening links to infected sites. In addition, hackers may try to take advantage of a user&#8217;s lack of knowledge; due to the speed at which technology is advancing, many consumers and workers are unaware of the real value of personal data and are unsure of which is the best way to protect this information.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-14243\" src=\"https:\/\/gsb.lat\/wp-content\/uploads\/2023\/10\/Imagen-principal-de-la-noticia-de-Ingenieria-Social.jpg\" alt=\"Main image of the Social Engineering news item\" width=\"1000\" height=\"450\" srcset=\"https:\/\/gsb.lat\/wp-content\/uploads\/2023\/10\/Imagen-principal-de-la-noticia-de-Ingenieria-Social.jpg 1000w, https:\/\/gsb.lat\/wp-content\/uploads\/2023\/10\/Imagen-principal-de-la-noticia-de-Ingenieria-Social-300x135.jpg 300w, https:\/\/gsb.lat\/wp-content\/uploads\/2023\/10\/Imagen-principal-de-la-noticia-de-Ingenieria-Social-768x346.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<h2>Life Cycle of a Social Engineering Cyber Attack<\/h2>\n<ol>\n<li>Information collection: This phase is also known as footprinting. The cybercriminal accumulates as much information as possible about the person or people (social engineering) to be deceived in order to learn about their interactions and relationships. This is a pre-deception phase and the following information is gathered:\n<ul>\n<li>Employees\u2019 list, telephone numbers, mailing addresses, etc.<\/li>\n<li>Company organization chart<\/li>\n<li>Departments\u2019, cabinets\u2019, work teams\u2019 names<\/li>\n<li>Technology service providers, material suppliers and other types of suppliers such as banks, etc.<\/li>\n<li>Physical location<\/li>\n<\/ul>\n<\/li>\n<li>Establishment of a relationship of trust: Once the information has been gathered, the attacker will establish a closer relationship with the victim.<\/li>\n<li>Manipulation: The cybercriminal will perform psychological manipulation by taking advantage of the gained trust in the previous phase. The objective will be to extract all kinds of confidential information that will be used to break into the system. Another objective is to get a certain action performed.<\/li>\n<li>Exit: Once the information has been extracted, the attacker will do everything in his power any kind of suspicion could fall on him\/her. To do so, he\/she will make sure not to leave any evidence that could link him\/her In this way, he\/she will be able to continue to enter the system in the future to continue exploiting his\/her source of information.<\/li>\n<\/ol>\n<p>You can always get information on these social engineering issues and other topics such as <a href=\"https:\/\/gsb.lat\/cursos\/certiprof-lead-cybersecurity-professional-certificate-lscpctm\/\">cybersecurity<\/a> with our team \u00a1Contact us! at the email: <a href=\"mailto:contacto@gsb.lat\">contacto@gsb.lat<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering is a set of techniques used by cybercriminals to trick unsuspecting users into sending them sensitive data, infecting their computers with malware or opening links to infected sites. In addition, hackers may try to take advantage of a user&#8217;s lack of knowledge; due to the speed at which technology is advancing, many consumers&hellip;<\/p>\n","protected":false},"author":2,"featured_media":14248,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[455],"tags":[609,608,610,611],"class_list":["post-14257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-english","tag-gsb-en","tag-social-engineering","tag-solutions","tag-tic-en","category-455","description-off"],"_links":{"self":[{"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/posts\/14257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/comments?post=14257"}],"version-history":[{"count":4,"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/posts\/14257\/revisions"}],"predecessor-version":[{"id":14262,"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/posts\/14257\/revisions\/14262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/media\/14248"}],"wp:attachment":[{"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/media?parent=14257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/categories?post=14257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gsb.lat\/en\/wp-json\/wp\/v2\/tags?post=14257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}