What is Social Engineering?

Social engineering is an attack technique in which an attacker tries to gain access to systems, information, or physical locations through manipulation of people.

Rather than exploiting technical vulnerabilities, social engineering targets human behaviour โ€” such as trust, fear, curiosity, or inattentiveness.


๐ŸŽฏ What is the goal of social engineering?

  • Gaining access to confidential data
  • Obtaining passwords or tokens
  • Installing Malware or Remote Access tools
  • Bypassing Access Control or Zero Trust measures
  • Eliciting unintended actions such as transferring money or granting access

๐Ÿงช Examples of social engineering

Technique Description
Phishing Fake emails or websites that ask for credentials
Pretexting Impersonating a colleague or authority (e.g. IT helpdesk)
Baiting Leaving an infected USB drive in a car park
Tailgating Following an employee through a secure door
Vishing Phoning to obtain data or access
Quid pro quo Pretending to offer something (e.g. support) in exchange for access or information

๐Ÿ” Why is social engineering so effective?

  • It plays on trust and routine
  • It is hard to detect with technical security alone
  • It uses urgency, curiosity, or fear to provoke quick action
  • Combinable with technical attacks (Phishing, Malware)
  • Targets people in key roles: system administrators, receptionists, operators

๐Ÿ›ก How can you protect yourself?

  • Security awareness training and realistic simulations
  • Strict procedures for Access Control and identity verification
  • Technical measures such as MFA, EDR, and SIEM
  • Report suspicious situations immediately to CSIRT or security
  • Always verify requests for sensitive information, even internally

๐Ÿ“Œ In summary

Social engineering is the art of deception โ€” and is one of the greatest risks in information and operational security. Countering it requires a combination of awareness, policy, and security.