answersLogoWhite

0

An attacker using reverse social engineering to obtain information will present himself as an authority offeringhelp on a particular subject, so that his targets come to him for advice. This is in contrast to simple social engineering, where the attacker portrays himself as needing help.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What are the difference between forward engineering and reverse eng in uml?

forward engineering: the creation of code from models. reverse engineering: the creation of models from code.


Why do engineers perform reverse engineering on products?

1. Reverse engineering is the process of generating the technical data required to duplicate a product functionally and dimensionally. 2. Reverse engineering is the process of analyzing a subject system to create representations of the system at a higher level of abstraction. 3. Reverse engineering is an element of product redesign, improvement and evolution. 4. Reverse engineering is the development of an operational understanding of a product. 5. Reverse engineering is the process of benchmarking a product's cost, performance and functionality. 6. Reverse engineering is a way to teach the engineering design process in a hands-on, intuitive way.


What is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information?

Social Engineering


Exploiting people to gain sensitive information is most associated with?

social engineering


What is the difference between reverse engineering and copy?

Reverse Engineering requires manufacturing and operational tolerances to be calculated. It can also include recalculation of materials and seals.


Is it possible to reverse engineer addiction?

There is no clear position as regards reverse engineering of addiction


What is social engineering'?

A Social Engineering attack is any attempt to get someone to divulge private information.


What is social engineering?

A Social Engineering attack is any attempt to get someone to divulge private information.


What is the purpose of engineering documentation in reverse engineering?

is to register the different components in the product by showing it piece by piece in reverse engineering and to paste it onto a document Old product they may designed the product with any documentation for future use, By doing reverse engineering, engineers will study the products from manufacture to design and start documentation for future use...


What is the definition of social engineering?

Social Engineering is the art of manipulating people to give up confidential information.


What engineering can you choose if you are not very interested in physics?

Social engineering.


What are the release dates for UFO Hunters - 2008 I Reverse Engineering 1-7?

UFO Hunters - 2008 I Reverse Engineering 1-7 was released on: USA: 19 March 2008