Professional Documents
Culture Documents
Internet Part 3
Internet Part 3
Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control
over your computer system. The hacker might use the phone, email, snail mail or direct contact to
gain illegal access. Phishing,
The whole idea is based on the exploitation of certain human emotions; the
three most common ones to exploit are:
Fear: Cybercriminals use tactics to induce fear in the user. They create a sense
of urgency, making the user believe their computer or personal information is in
immediate danger.
Curiosity: Cybercriminals exploit human curiosity by presenting inviting
scenarios. For example, they may claim that the user has won a valuable prize,
like a car, or they
Empathy and Trust: People generally tend to trust and have empathy for
seemingly legitimate and well-established companies. Cybercriminals take
advantage of this trust by impersonating such companies through emails or
phone calls.
Stages of social engineering
4. Anti-spyware
Is a kind of software is intended to prevent and detect unwanted spyware and,
consequently, removes them. Anti-spyware software will perform routine
checks on your computer to ensure your system is safe. As well as this, it will
also make sure your privacy is protected 24/7 from any possible intrusions.
Key functions and benefits of anti-spyware tools:
Spyware Detection: scan a computer system and detect the presence of
spyware, adware, and other potentially unwanted programs (PUPs). It
identifies files, registry entries, and system components that may be
associated with spyware.
Scheduled Scans: Users can schedule regular scans to ensure that their
systems are continuously checked for spyware.
factors used in authentication
Hand scanner - Like your fingerprint, the palm of your hand is also
unique to you. A biometric hand scanner or hand geometry system
identifies the person by the palm of their hand.