1 00:00:00,640 --> 00:00:04,090 In this section, we're going to discuss social engineering. 2 00:00:04,090 --> 00:00:06,420 Now I know I've talked about a lot throughout this course, 3 00:00:06,420 --> 00:00:08,100 but we're going to use this short section 4 00:00:08,100 --> 00:00:09,970 to kind of review some of the main concepts 5 00:00:09,970 --> 00:00:12,080 to make sure you're good for test day. 6 00:00:12,080 --> 00:00:14,010 Now, social engineering is any act 7 00:00:14,010 --> 00:00:15,700 that manipulates users into revealing 8 00:00:15,700 --> 00:00:17,660 confidential information or performing 9 00:00:17,660 --> 00:00:20,250 other actions that are detrimental to that user 10 00:00:20,250 --> 00:00:22,080 or the security of our systems. 11 00:00:22,080 --> 00:00:23,310 Now, there's lots of different types 12 00:00:23,310 --> 00:00:24,380 of social engineering. 13 00:00:24,380 --> 00:00:25,850 There's things like pretexting, 14 00:00:25,850 --> 00:00:28,540 malicious insider threats, diversion theft, 15 00:00:28,540 --> 00:00:31,280 phishing, hoaxes, shoulder surfing, 16 00:00:31,280 --> 00:00:33,770 eavesdropping, dumpster diving, baiting, 17 00:00:33,770 --> 00:00:36,360 piggybacking, and watering hole attacks. 18 00:00:36,360 --> 00:00:37,750 We're going to talk about all of these 19 00:00:37,750 --> 00:00:39,130 throughout this section. 20 00:00:39,130 --> 00:00:40,990 And then we're going to talk about the importance 21 00:00:40,990 --> 00:00:43,410 of user education, because the user 22 00:00:43,410 --> 00:00:45,450 is really important in helping us avoid 23 00:00:45,450 --> 00:00:47,010 social engineering attacks. 24 00:00:47,010 --> 00:00:49,600 So, let's get started in the next lesson 25 00:00:49,600 --> 00:00:53,354 where I'm going to show you how a pretext actually occurs. 26 00:00:53,354 --> 00:00:55,407 (buzzing)