top of page

Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users into handing over confidential or sensitive data.

​

Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky.

​

What does social engineering look like? It could look like an email that has been designed to seem like it is from a credible organization, like your message service or Fed Ex or even your bank.

​

But if you open it and click on that attachment, you could be installing malware or ransomware. Or, it could be disguised to look like it comes from someone inside your school or place of business (like an unusual title such as IT@yourorganization – someone whom you trust). But if you respond to that email with your user name and password, your computer is easily compromised.

Social Engineering

Social Engineering Lesson Objectives:

​

  • Define common social engineering terms

  • Name four common social engineering schemes

  • Identify characteristics of the four types of social engineering scams

Approximate time to complete this lesson is 15 minutes

Complete the lesson to learn more about Social Engineering
by clicking the Next buttons within the module.
Once the module is complete, click the Continue button below
to progress to the next lesson.
bottom of page