Question

In: Psychology

Describe the main tactics used by social engineers when profiling a person, a. Persuasion b. Intimidation...

Describe the main tactics used by social engineers when profiling a person,

a. Persuasion

b. Intimidation

c. Coercion

d. Extortion

e. Blackmailing

Provide an example/scenario for each tactic.

Solutions

Expert Solution

Social engineering is a process of psychological manipulation of people leading them to perform certain actions or divulge confidential information. The techniques of social engineering are based on cognitive biases.

While profiling a person, the social engineers use the following tactics:

a) Persuasion: Social engineers use persuasion as a profiling technique because this technique is subtle and therefore hard to detect, proving it to be a very powerful technique. In order to use persuasion the social engineer needs to be likeable or in a position of authority. These people are keen observers and they catch one's exact weakness to persuade them in doing a certain task. For example, many fraud companies sell their products to people by persuading them about it's scarce availability and fake reputation.

b) Intimidation: Here the attacker pretends to be someone influential and tries to push and bully the victim to cooperate. For example, a boss tries to intimidate an employee who refuses certain favours, by refusing his/her job sanctions.

c) Coercion: When attackers trick and force a person to reveal information about their encrypted messages and other private details, it is the use of coercion. For example, sending spam mails, text messages to people from whom personal details such as bank account details needs to be extracted.

d) Extortion: Extortion could be in the form of deceiving people with fake identities of the attackers or threatening them if the required information is not revealed by the victims. For example, social engineers are seen attacking high ranking officers to extort them for company resources such as funds, employee data or intellectual property.

e) Blackmailing: In this technique, a social engineer pretends to be a friend in the beginning and in the process learns all secrets of the victims which he/she later uses to blackmail the victim for the actual required information or money. For example, attackers using social networking sites to make friends with potential victims.


Related Solutions

Describe three secondary tactics that are used to maximize stockholder wealth.
Describe three secondary tactics that are used to maximize stockholder wealth.
A. Describe how credibility forms a basis for persuasion. B. Explain how the tone and style...
A. Describe how credibility forms a basis for persuasion. B. Explain how the tone and style of persuasive messages impact their persuasiveness. Specifically, address how personal touch, action-oriented language, confidence, choice, and positivity affect how message recipients respond. C. Explain the AIM planning process for persuasive messages and the basic components of most persuasive messages.
Define what is meant by both the central and peripheral routes to persuasion. Describe when people...
Define what is meant by both the central and peripheral routes to persuasion. Describe when people are more likely to use the central route to persuasion, and when they are more likely to use the peripheral route. When people are using the central route, what will make an appeal more persuasive? When they are using the peripheral route, what will make an appeal more persuasive?
Write some ideas on: When a person uses social media like Facebook, this person begins to...
Write some ideas on: When a person uses social media like Facebook, this person begins to live in a virtual online world that may lead to various psychological problems.
When type B blood is given to a person with type A blood, __________. the B...
When type B blood is given to a person with type A blood, __________. the B antigen from the donor reacts with anti-A antibody in the recipient the B antigen from the donor reacts with anti-B antibody in the recipient the A antigen from the donor reacts with anti-A antibody in the recipient the B antigen from the recipient reacts with anti-B antibody in the donor
When is specific performance an appropriate remedy? Will it be used to require a person to...
When is specific performance an appropriate remedy? Will it be used to require a person to perform a service (such as properly repair a leaky roof)?
When is the statistical regression test used in social science?
When is the statistical regression test used in social science?
when engineers disagree with their employees they may engage in organizational disobedience. Describe three types of...
when engineers disagree with their employees they may engage in organizational disobedience. Describe three types of organizational disobedience (by contrary action,by nonparticipation, by protest.)
23)Describe the pharmaceutical effects of Acetaminophen. When is it used? When is it not used? Treatment...
23)Describe the pharmaceutical effects of Acetaminophen. When is it used? When is it not used? Treatment for medication overdose 24)What is the pharmaceutical differences between Aspirin and Acetaminophen? 29)Review the signs and symptoms in Opioid withdrawal? 30)Review the signs and symptoms of Opioid toxicity / overdose. What medication is given to counteract he opioid toxicity?
a. Explain the FIVE modes of intervening to facilitate changes. b. Describe strategies used when planning...
a. Explain the FIVE modes of intervening to facilitate changes. b. Describe strategies used when planning and preparing for change
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT