Social engineering is one of the trickiest parts of the network security
CIS 100 Week 3: Discussion – Limiting Local Security Threats
One of the hardest aspects of being a network administrator is to manage and limit threats to the physical network and the data
that it contains.
Social engineering is one of the trickiest parts of the network security. It involves targeting people with convincing techniques to pry information from unsuspecting persons to compromise the network.
Whether it was shoulder surfing, phishing, tailgating or impersonation, many techniques have been proven quite successful in compromising data. Pick one social engineering technique (shoulder surfing, phishing, tailgating, impersonation) and explain how you would use that technique to pry information from an unsuspecting person.
Do you have clear everything? Btw, the citation should be a scholarly source
Solution preview for the order on social engineering is one of the trickiest parts of the network security