{"id":59120,"date":"2022-02-11T12:30:37","date_gmt":"2022-02-11T07:00:37","guid":{"rendered":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/"},"modified":"2024-09-12T16:01:23","modified_gmt":"2024-09-12T10:31:23","slug":"social-engineering-attack","status":"publish","type":"post","link":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/","title":{"rendered":"Social Engineering Attack: Definition, Exemplification, and Prevention Suggestions"},"content":{"rendered":"\n<p>Social Engineering Attack is a term related to cyber security where malicious activities are achieved through human interactions. When a hacker uses psychological tricks on a user, they make security mistakes or end up giving highly restrictive personal information like bank account details, PAN card numbers, etc.<\/p>\n\n\n\n<p>Social engineering will take place in one or more steps. The offender tries to gather the victim's background information and finds the weak protocols that would help him proceed with the attack. The attacker tries to gain the victims' trust because it is easier to crack than to discover new ways to hack the software. In simpler terms, it is easy to fool and get a password or OTP from you instead of trying to break your password.<\/p>\n\n\n\n<p>After doing a survey, it was found that the weakest link in the security chain is \"the human.\" The one who believes the other person's or scenario at face value. To learn more about such concepts in cybersecurity, upskill with the <a href=\"https:\/\/www.mygreatlearning.com\/online-cyber-security-course\">PG Cybersecurity Program<\/a> and power ahead!<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#how-does-social-engineering-work\"><strong>How does Social Engineering work? <\/strong><\/a><\/li><li><strong><a href=\"#what-makes-social-engineering-dangerous\">What makes social engineering dangerous?<\/a><\/strong><\/li><li><strong><a href=\"#techniques-of-social-engineering-attack\">Techniques of Social Engineering Attack<\/a><\/strong><\/li><li><strong><a href=\"#preventing-social-engineering\">Preventing Social Engineering<\/a><\/strong><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-social-engineering-work\"><strong>How does Social Engineering work?<\/strong><\/h2>\n\n\n\n<p>Most social engineering attacks are between attackers and victims. The attacker tends to gain the trust of the victim instead of using the brute force method.<\/p>\n\n\n\n<p>They follow the below steps in deceiving you:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Prepare: gather all of the necessary information from you.<\/li><li>Infiltrate: establish a relationship and build trust.<\/li><li>Exposed victim: Once trust and relationship are established, the weaknesses for the attack are established.<\/li><li>Disengage: The user has taken the desired action.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-makes-social-engineering-dangerous\"><strong>What makes social engineering dangerous?<\/strong><\/h2>\n\n\n\n<p>Social engineering is dangerous because it relies on human error rather than vulnerabilities in software. Mistakes made by users are more unpredictable and hard to identify than malware intrusions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"techniques-of-social-engineering-attack\"><strong>Techniques of Social Engineering Attack<\/strong><\/h2>\n\n\n\n<p>Social engineering comes in different forms and could be done anywhere where human interaction is involved. These are the five most common forms of social engineering.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Baiting<\/strong><\/li><\/ol>\n\n\n\n<p>These social engineering techniques know that if you sway something people want, many people will take the bait. The name suggests the attacker uses false promises to entice the victim's greed or curiosity. They lure users into the trap to steal their information and inflict their systems with malware. Victims pick up bait devices out of curiosity and try to insert them into their home or work laptops, which results in installing malicious malware installation. Baiting is not only done in the physical world; it can be done in online form too. An online form of baiting consists of malicious sites' advertisements or encouraging users to download <a href=\"https:\/\/www.mygreatlearning.com\/blog\/types-of-cyber-attacks\/#Malware\" target=\"_blank\" rel=\"noreferrer noopener\">malware-infected <\/a>applications.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Scareware<\/strong><\/li><\/ol>\n\n\n\n<p>Scareware involves victims being called out with false alarms and fabricated threats. Users are duped into believing their system is infected with malware or other threats, prompting them to install software with no real benefits. Scareware is also referred to as deception software, rogue scanners, and fraudware.<\/p>\n\n\n\n<p>Your computer will be prompted with messages such as \"Your computer may be infected with harmful spyware programs.\" It either makes you click on the malicious websites and results in downloading such software, or it could infect the computer by clicking on such notification. Scareware is also sent through emails.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Pretexting<\/strong><\/li><\/ol>\n\n\n\n<p>In these cases, attackers try to gain information from the user cleverly. This type of scam is frequently initiated by an offender pretending to require the victim's highly sensitive information to complete a critical task.<\/p>\n\n\n\n<p>The attacker usually tries to build a trusting relationship with the&nbsp;victim by impersonating<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>co-worker<\/li><li>police<\/li><li>bank associate<\/li><li>Tax officials'&nbsp;<\/li><li>or any known person who has the right to know.<\/li><\/ul>\n\n\n\n<p>The perpetrator gathers all such information from the victim via phone call or email. The information, such as<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Pancard No.<\/li><li>Adhar Card No.<\/li><li>Social security number (US residents only)<\/li><li>Candian Social Insurance Number (Canadian resident people)<\/li><li>Bank Account No.<\/li><li>Swift code<\/li><li>Addresses<\/li><li>Credit or debit card information<\/li><\/ul>\n\n\n\n<p>They try to hijack your bank account using the information gathered from you. Also, they can create a duplicate identity using their social security number.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong><a href=\"https:\/\/www.mygreatlearning.com\/blog\/top-phishing-scams-and-how-to-protect-against-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing<\/a><\/strong><\/li><\/ol>\n\n\n\n<p>This attack is a very common one and is executed via phone or email. This creates a sense of urgency like your password has expired and you need a quick fix, or your bank details are not correct, and you need to update urgently as it will result in blocking your card. Such an email would be identical. They will ask for urgent action, which usually leads to victim panic. In such a situation, the victim usually makes a mistake by clicking on the link provided in the email or text message.<\/p>\n\n\n\n<p>Such websites are replicas of new ones, and they are created to target specific victims who will end up entering their correct information.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Spear Phishing<\/strong><\/li><\/ol>\n\n\n\n<p>Spear phishing is the more targeted version as it is much harder to detect and has a high success rate. This requires much effort by the attacker to make it look less conspicuous.<\/p>\n\n\n\n<p>For example, a person looking for a job would put all his information related to skills, his current job profile, and the location he is targeting on any job-related sites such as Indeed, Naukri, etc. While these job portals also offer subscription plans so that your profile will be targeted at the top for recruiters, the attackers gather your information from such websites and would call you on behalf of any associate belonging to these portals and would ask you questions if you are getting a valid opportunity or not. He will try to convince you to get a refund from the subscribed person. When the victim does get convinced by his idea of receiving the fund, they will send you an identical website link which will ask you to fill in all the information, and when all the bank details and other user\u2019s information are received by the attacker, He might ask you for an OTP on your number. If the victim provides the one-time password to the offender, The money that was promised to be debited will now be credited to the attacker\u2019s account.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"preventing-social-engineering\"><strong>Preventing Social Engineering<\/strong><\/h2>\n\n\n\n<p>Below are some important measures to be followed to avoid social engineering attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Do not open emails and attachments from suspicious sources.<\/li><li>Use multifactor authentication.<\/li><li>Beware of tempting offers.<\/li><li>Keep your antivirus\/ antimalware software updated<\/li><\/ul>\n\n\n\n<p>Also Read: <a href=\"https:\/\/www.mygreatlearning.com\/blog\/top-blogs-to-follow-to-learn-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top 50 Blogs to Follow to Learn Cyber Security in 2022<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social Engineering Attack is a term related to cyber security where malicious activities are achieved through human interactions. When a hacker uses psychological tricks on a user, they make security mistakes or end up giving highly restrictive personal information like bank account details, PAN card numbers, etc. Social engineering will take place in one or [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":59126,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[8],"tags":[],"content_type":[],"class_list":["post-59120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Social Engineering Attack: Definition, Prevention Measures<\/title>\n<meta name=\"description\" content=\"Social engineering attack is a term related to cyber security where malicious activities are achieved through human interactions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering Attack: Definition, Exemplification, and Prevention Suggestions\" \/>\n<meta property=\"og:description\" content=\"Social engineering attack is a term related to cyber security where malicious activities are achieved through human interactions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Great Learning Blog: Free Resources what Matters to shape your Career!\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GreatLearningOfficial\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-11T07:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-12T10:31:23+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1254\" \/>\n\t<meta property=\"og:image:height\" content=\"836\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Great Learning Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/Great_Learning\" \/>\n<meta name=\"twitter:site\" content=\"@Great_Learning\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Great Learning Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/\"},\"author\":{\"name\":\"Great Learning Editorial Team\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/person\\\/6f993d1be4c584a335951e836f2656ad\"},\"headline\":\"Social Engineering Attack: Definition, Exemplification, and Prevention Suggestions\",\"datePublished\":\"2022-02-11T07:00:37+00:00\",\"dateModified\":\"2024-09-12T10:31:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/\"},\"wordCount\":1081,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/iStock-479801118.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/\",\"name\":\"Social Engineering Attack: Definition, Prevention Measures\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/iStock-479801118.jpg\",\"datePublished\":\"2022-02-11T07:00:37+00:00\",\"dateModified\":\"2024-09-12T10:31:23+00:00\",\"description\":\"Social engineering attack is a term related to cyber security where malicious activities are achieved through human interactions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/iStock-479801118.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/iStock-479801118.jpg\",\"width\":1254,\"height\":836,\"caption\":\"Social Engineering Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/social-engineering-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Social Engineering Attack: Definition, Exemplification, and Prevention Suggestions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\",\"name\":\"Great Learning Blog\",\"description\":\"Learn, Upskill &amp; Career Development Guide and Resources\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\"},\"alternateName\":\"Great Learning\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\",\"name\":\"Great Learning\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/GL-Logo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/GL-Logo.jpg\",\"width\":900,\"height\":900,\"caption\":\"Great Learning\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/GreatLearningOfficial\\\/\",\"https:\\\/\\\/x.com\\\/Great_Learning\",\"https:\\\/\\\/www.instagram.com\\\/greatlearningofficial\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/great-learning\\\/\",\"https:\\\/\\\/in.pinterest.com\\\/greatlearning12\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/beaconelearning\\\/\"],\"description\":\"Great Learning is a leading global ed-tech company for professional training and higher education. It offers comprehensive, industry-relevant, hands-on learning programs across various business, technology, and interdisciplinary domains driving the digital economy. These programs are developed and offered in collaboration with the world's foremost academic institutions.\",\"email\":\"info@mygreatlearning.com\",\"legalName\":\"Great Learning Education Services Pvt. Ltd\",\"foundingDate\":\"2013-11-29\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/person\\\/6f993d1be4c584a335951e836f2656ad\",\"name\":\"Great Learning Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"caption\":\"Great Learning Editorial Team\"},\"description\":\"The Great Learning Editorial Staff includes a dynamic team of subject matter experts, instructors, and education professionals who combine their deep industry knowledge with innovative teaching methods. Their mission is to provide learners with the skills and insights needed to excel in their careers, whether through upskilling, reskilling, or transitioning into new fields.\",\"sameAs\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/\",\"https:\\\/\\\/in.linkedin.com\\\/school\\\/great-learning\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/Great_Learning\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCObs0kLIrDjX2LLSybqNaEA\"],\"award\":[\"Best EdTech Company of the Year 2024\",\"Education Economictimes Outstanding Education\\\/Edtech Solution Provider of the Year 2024\",\"Leading E-learning Platform 2024\"],\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/author\\\/greatlearning\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Social Engineering Attack: Definition, Prevention Measures","description":"Social engineering attack is a term related to cyber security where malicious activities are achieved through human interactions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering Attack: Definition, Exemplification, and Prevention Suggestions","og_description":"Social engineering attack is a term related to cyber security where malicious activities are achieved through human interactions.","og_url":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/","og_site_name":"Great Learning Blog: Free Resources what Matters to shape your Career!","article_publisher":"https:\/\/www.facebook.com\/GreatLearningOfficial\/","article_published_time":"2022-02-11T07:00:37+00:00","article_modified_time":"2024-09-12T10:31:23+00:00","og_image":[{"width":1254,"height":836,"url":"http:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg","type":"image\/jpeg"}],"author":"Great Learning Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/Great_Learning","twitter_site":"@Great_Learning","twitter_misc":{"Written by":"Great Learning Editorial Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/#article","isPartOf":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/"},"author":{"name":"Great Learning Editorial Team","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/person\/6f993d1be4c584a335951e836f2656ad"},"headline":"Social Engineering Attack: Definition, Exemplification, and Prevention Suggestions","datePublished":"2022-02-11T07:00:37+00:00","dateModified":"2024-09-12T10:31:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/"},"wordCount":1081,"commentCount":0,"publisher":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/","url":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/","name":"Social Engineering Attack: Definition, Prevention Measures","isPartOf":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg","datePublished":"2022-02-11T07:00:37+00:00","dateModified":"2024-09-12T10:31:23+00:00","description":"Social engineering attack is a term related to cyber security where malicious activities are achieved through human interactions.","breadcrumb":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/#primaryimage","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg","width":1254,"height":836,"caption":"Social Engineering Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mygreatlearning.com\/blog\/social-engineering-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mygreatlearning.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.mygreatlearning.com\/blog\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Social Engineering Attack: Definition, Exemplification, and Prevention Suggestions"}]},{"@type":"WebSite","@id":"https:\/\/www.mygreatlearning.com\/blog\/#website","url":"https:\/\/www.mygreatlearning.com\/blog\/","name":"Great Learning Blog","description":"Learn, Upskill &amp; Career Development Guide and Resources","publisher":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization"},"alternateName":"Great Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mygreatlearning.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization","name":"Great Learning","url":"https:\/\/www.mygreatlearning.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/06\/GL-Logo.jpg","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/06\/GL-Logo.jpg","width":900,"height":900,"caption":"Great Learning"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GreatLearningOfficial\/","https:\/\/x.com\/Great_Learning","https:\/\/www.instagram.com\/greatlearningofficial\/","https:\/\/www.linkedin.com\/school\/great-learning\/","https:\/\/in.pinterest.com\/greatlearning12\/","https:\/\/www.youtube.com\/user\/beaconelearning\/"],"description":"Great Learning is a leading global ed-tech company for professional training and higher education. It offers comprehensive, industry-relevant, hands-on learning programs across various business, technology, and interdisciplinary domains driving the digital economy. These programs are developed and offered in collaboration with the world's foremost academic institutions.","email":"info@mygreatlearning.com","legalName":"Great Learning Education Services Pvt. Ltd","foundingDate":"2013-11-29","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/person\/6f993d1be4c584a335951e836f2656ad","name":"Great Learning Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","caption":"Great Learning Editorial Team"},"description":"The Great Learning Editorial Staff includes a dynamic team of subject matter experts, instructors, and education professionals who combine their deep industry knowledge with innovative teaching methods. Their mission is to provide learners with the skills and insights needed to excel in their careers, whether through upskilling, reskilling, or transitioning into new fields.","sameAs":["https:\/\/www.mygreatlearning.com\/","https:\/\/in.linkedin.com\/school\/great-learning\/","https:\/\/x.com\/https:\/\/twitter.com\/Great_Learning","https:\/\/www.youtube.com\/channel\/UCObs0kLIrDjX2LLSybqNaEA"],"award":["Best EdTech Company of the Year 2024","Education Economictimes Outstanding Education\/Edtech Solution Provider of the Year 2024","Leading E-learning Platform 2024"],"url":"https:\/\/www.mygreatlearning.com\/blog\/author\/greatlearning\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg",1254,836,false],"thumbnail":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118-150x150.jpg",150,150,true],"medium":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118-768x512.jpg",768,512,true],"large":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg",1254,836,false],"2048x2048":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118.jpg",1254,836,false],"web-stories-poster-portrait":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118-640x836.jpg",640,836,true],"web-stories-publisher-logo":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118-96x96.jpg",96,96,true],"web-stories-thumbnail":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/iStock-479801118-150x100.jpg",150,100,true]},"uagb_author_info":{"display_name":"Great Learning Editorial Team","author_link":"https:\/\/www.mygreatlearning.com\/blog\/author\/greatlearning\/"},"uagb_comment_info":1,"uagb_excerpt":"Social Engineering Attack is a term related to cyber security where malicious activities are achieved through human interactions. When a hacker uses psychological tricks on a user, they make security mistakes or end up giving highly restrictive personal information like bank account details, PAN card numbers, etc. Social engineering will take place in one or&hellip;","_links":{"self":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/59120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/comments?post=59120"}],"version-history":[{"count":9,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/59120\/revisions"}],"predecessor-version":[{"id":72669,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/59120\/revisions\/72669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/media\/59126"}],"wp:attachment":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/media?parent=59120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/categories?post=59120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/tags?post=59120"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/content_type?post=59120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}