Page 166 - CISSO_Prep_ Guide
P. 166

power of social engineering. There are several forms of social
            engineering, including Name-dropping, Intimidation, Appealing
            for help, and Technical.



            Name-Dropping

            Name-dropping is used to convince an employee that another
            person has authorized them to do something for the supplicant.
            For example, a person calls up to an administrator and states that
            the administrator's boss has authorized the supplicant to have
            access to a system or network and said that the administrator
            would set this up.



            Intimidation

            Intimidation is the act of threatening a person to commit an
            unauthorized action. This is often done by threatening to
            escalate to a manager, threatening the job of the employee that is
            not willing to break the rules or even threatening the family of
            the employee.

            One of the reasons that this is so successful is that many
            managers also do this and expect a different form of treatment
            than other staff gets. For example, a manager may not think that
            they have to show or wear an ID card to obtain entrance to a
            facility. A person that would challenge the manager to show
            their card would be at risk of losing their job. Such action
            creates a fear that can be exploited by an imposter that claims to
            be a manager and, therefore, is affronted that anyone would dare
            challenge them.
   161   162   163   164   165   166   167   168   169   170   171