answersLogoWhite

0


Best Answer

A good Social Engineer will gather all and any information he/she can get his/her hands on. The more information you have regarding the subject or person, the better, because they more you have, the greater the avenues for exploitation become.

The information may include places of employment, daily routines, family life, car/s currently owned as well as cars driven, is the victim married or single, does he/she have children, which school they attended and the like.

The above avenues are some of the information a Engineer may choose to acquire. The actual amount is specific to the individual or company.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar
More answers
User Avatar

AnswerBot

2d ago

Social engineering typically involves gathering sensitive information such as passwords, personal details, account numbers, or other confidential data through manipulation or deception rather than technical hacking methods. This information can then be used to gain unauthorized access to systems or accounts.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of information is usually gathered by social engineering?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Exploiting people to gain sensitive information is most associated with?

social engineering


What is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information?

Social Engineering


What is social engineering?

A Social Engineering attack is any attempt to get someone to divulge private information.


What is social engineering'?

A Social Engineering attack is any attempt to get someone to divulge private information.


What is social engineering attack?

A social engineering attack is when an attacker manipulates individuals into revealing confidential information or performing actions that compromise security. This can include tactics such as phishing emails, phone calls, or impersonation to exploit human psychology and gain access to sensitive data.


What is the definition of social engineering?

Social Engineering is the art of manipulating people to give up confidential information.


What term describes a social engineering attack that attempts to get a user to divulge information via a disguised electronic communication?

social engineering


Is Using false pretenses to gain information social engineering?

true


What is social engineering When talking about online activity?

Social engineering in the context of online activity refers to the manipulation of individuals to disclose confidential information or perform certain actions, such as clicking on links or downloading malware. It often involves psychological manipulation to exploit human behavior rather than technical methods to breach security systems. Social engineers may pose as trustworthy entities to deceive individuals into divulging sensitive information.


When talking about online activity.what is social engineering?

When it comes to online activities, social engineering is the act of manipulating people into performing actions that uncover their confidential information


Social engineering attack?

A social engineering attack involves manipulating individuals into divulging sensitive information or performing actions that compromise security. Attackers often use psychological tactics to deceive or manipulate people, such as phishing emails or phone scams impersonating trusted entities. It is important for individuals to be cautious and aware of potential social engineering tactics to avoid falling victim to such attacks.


What is reverse social engineering?

Reverse social engineering involves manipulating individuals to divulge information or take actions that undermine the security of an organization. This technique exploits feelings of trust or authority to deceive individuals into providing access to sensitive information or resources. It is often used by malicious actors to infiltrate systems or gain unauthorized access to data.