{"id":284,"date":"2025-12-03T04:10:33","date_gmt":"2025-12-03T04:10:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/?page_id=284"},"modified":"2025-12-05T14:57:28","modified_gmt":"2025-12-05T14:57:28","slug":"topic-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/topic-1\/","title":{"rendered":"Social Engineering Attacks"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Social Engineering attacks were discussed as a topic within Module 2 of this class pertaining to \u2018Pervasive attack surfaces and controls\u2019. The main things involved in this topic are understanding what exactly social engineering is and what the various types of social engineering attacks are.<br>Through the course content to include the book, PowerPoint, our class with Dr. Cooper, and module information I\u2019ve grasped that social engineering is what somebody (or something) is doing when they are trying to get information from someone else or are trying to get that person to do something that could weaken the security of a system. Weakening the security of the system could get the same result of obtaining information. Most social engineering is done in a way to trick the person into giving up the information or trick them into doing something that could provide access to the person or thing that is doing the social engineering. This could come in the form of pretending to be someone else or having a legitimate reason, or it could be just a trick in general to get them to click on something or download a file.\u00a0 This leads us into all the various types of attacks and the defenses available to stave off these attacks.<br><br>Phishing is one of the most common and it\u2019s essentially impersonating something or someone else via e-mail in order to get someone to divulge information that they otherwise wouldn\u2019t if they knew who they were really talking to \/ dealing with. The various forms of phishing include:<br>&#8211; Vishing \u2013 using phone calls to request information<br>&#8211; Smishing \u2013 using texts to request information or send malicious links<br>&#8211; Whaling \u2013 usually more sophisticated and targeting higher profile people like CEOs, etc.<br>&#8211; Spear phishing \u2013 targets specific persons or groups<br><br>Other types of social engineering attacks include: <br>Impersonating \u2013 can be done via phishing but could also be done in person. Basically pretending to be someone you\u2019re not. Social media could be a place this happens as well with how easy it is to make fake profiles of people.<br><br>Redirection \u2013 getting somebody to go to a site that looks almost exactly like the \u2018real\u2019 site. This is usually done by having a slight variation in the url itself so that people are less likely to realize the site is fake.<br><br>Misinformation \u2013 This is just information that is either false or misleading<br><br>Disinformation \u2013 This is false information that is spread with the intent to deceive someone and it can often be to try and get someone to do something they wouldn\u2019t if they had truthful information.<br><br>Malinformation \u2013 Not mentioned in the course from what I saw but while reading into these topics further I found this. It is essentially information that is true but it is presented in a way that misleads and causes potential harm. (Canadian Centre for Cyber Security, 2024)<br><br>Watering hole \u2013 This is where a website contains malware and infects those who visit it. The social engineering aspect comes from leading people to the site.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<p>Through doing some deeper dives on the different types of social engineering attacks. I came across this chart that shows the prevalence of social engineering attacks that make up ransomware infections. (Bonnie, 2025) Most, if not all of these delivery methods can be traced back to or lead to a type of social engineering attack. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart-1024x1024.jpg\" alt=\"\" class=\"wp-image-327\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart-1024x1024.jpg 1024w, https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart-300x300.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart-150x150.jpg 150w, https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart-768x768.jpg 768w, https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart-600x600.jpg 600w, https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart-945x945.jpg 945w, https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-content\/uploads\/sites\/40265\/2025\/12\/prevalence-of-phishing-chart.jpg 1440w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<p>One of the assignments related to this topic was looking at the different database breaches at https:\/\/oag.ca.gov\/privacy\/databreach\/list  I found this very interesting as I didn&#8217;t realize all of that information was at our fingertips until this assignment showed us. <br><br>While putting together this ePortfolio I revisited the site and noticed there was a recent one on there for Discord dated 11\/26\/2025 which might explain why I noticed the past few days I&#8217;ve had to keep logging in to discord multiple times per evening. Before this weekend I have barely ever had to put the password in, it just stayed logged in. I guess I&#8217;ll be changing my password to be on the safe side. <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social Engineering attacks were discussed as a topic within Module 2 of this class pertaining to \u2018Pervasive attack surfaces and controls\u2019. The main things involved in this topic are understanding what exactly social engineering is and what the various types&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/topic-1\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31783,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/pages\/284"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/users\/31783"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/pages\/284\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/pages\/284\/revisions\/347"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/media?parent=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}