Battling Social Engineering Attacks with CompTIA Security+ Certification

Jennifer Balsom
3 min readMar 12, 2018

--

Social engineering is a term to identify a broad range of malicious activities that occurs through human interactions. It targets to hit the minds of people psychologically and manipulates them to commit security errors or reveal sensitive information. CompTIA confers importance to social engineering by incorporating it as a key domain in the Security+ training and certification.

Social Engineering Attacks

Social engineering attacks occur in multiple steps. The attackers identify potential entry points and take advantage of weak security protocols. Then, they try to gain victim’s confidence and draw out sensitive information from them.

· Shoulder Surfing: Shoulder surfing relates to the activity wherein the graphical or alpha-numeric passwords, PIN, email addresses and other sensitive information is stolen by simply observing individuals from an unnoticeable angle. This tactic is common and effective at the crowded places like ATMs, railway stations, airports etc. Shoulder surfing is even possible through spy cameras and handy tools.

Countermeasure: Screen protections can be used to protect the crucial data. Adding an additional password authentication step can help countering Shoulder surfing, as memorizing multiple steps become cumbersome.

· Tailgating: Tailgating is a way where attackers take advantage of social conventions and in disguise, enter the restricted buildings to carry out their schemes. In the world of cybersecurity, tailgating leads to alterations in the surveillance systems and devices of high security areas.

Countermeasure: It can be dealt by increasing physical barriers at the entry. Authenticated users can have smartcards or badges to gain entry while visitors can be asked to put in their personal information before taking entry.

· Dumpster Diving: This technique relates to search sensitive information by digging into the trash. These days enormous information is available in printed paper form. If organizations go careless in disposing their papers, much harm can be caused by drawing information out of it. It is also possible with virtual recycle bin.

Countermeasure: It is highly recommended to shred and erase all confidential information from the computer systems and same can be done with manual files and papers.

· Impersonation: This technique falls in place when any intruder gains access to the restricted buildings or confidential information by faking the identity of someone else. Remotely, it gets possible with a fake phone call.

Countermeasure: Rigorous set of procedures to verify the identity of a message sender or caller can be a way to control the impersonation.

· Whaling: This is a kind of phishing attack that targets to gather essential and confidential information about the internal procedures of the organization. The attackers fabricate the information and order subordinates, that seem from seniors and they tend to respond accordingly.

Countermeasure: Cross-checking the contact details and name of the sender can help the subordinates to identify such attacks and play safe.

· Hoax : A hoax is a warning to the user about an imminent threat that asks them to perform certain steps to protect themselves from a virus attack. Internal hoaxes on updating the security software is another way of intruding the security of an organization.

Countermeasure: Keeping systems updated with the latest version of the anti-virus software and 24/7 enabled firewalls offers the best defense strategy against automated hoaxes.

Conclusion

Social Engineering is one of the most focused area in CompTIA Security+ training and certification course. This extensive Security Plus training course from CompTIA aims to instill a pragmatic approach to protect against social engineering attacks and help you become proficient with the countermeasures. CompTIA Security Plus training and certification course provides you with in-depth technical understanding that validates your expertise to extend a protection shield to your organization’s system and network.

Related Articles:

All You Need to Know About CompTIA Security+

Why Should You Go for a Security+ Certification?

Step Ahead with CompTIA Security+ Certification

How Does CompTIA Security+ Certification Help in Advancing Your Career

--

--

Jennifer Balsom
Jennifer Balsom

Written by Jennifer Balsom

Product Manager - Cybersecurity CompTIA, EC-council & (ISC)2. For more info. visit, https://www.netcomlearning.com/vendors/CompTIA-training-courses.phtml

No responses yet