Why Social Engineering Works So Well ๐
Learn how social engineering tricks fool people in cybersecurity with Keith Barker. Start your security training today!

CBT Nuggets
6.2K views โข May 31, 2021

About this video
Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security
In this video, Keith Barker covers some of the social engineering techniques and tactics that hostile actors use. Social engineering isn't simply about stealing data or stealing money, they can also be deployed to compromise the thoughts of a group of people. If an attacker or group could modify the minds and thoughts of tens or hundreds of millions of people, the consequences could be monumental.
The fabric of social media is an ideal attack vector for influence campaigns, in which internet users and their thoughts get targeted. There are underlying reasons that certain social engineering techniques are so effective. These are often called the principles.
The first principle is authority. Humans are hard-wired to be persuaded by people they consider in positions of authority. Crucially, that doesn't mean anyone with any authority. For a speaker's authority to influence someone due to their authority, the listener has to believe in the authority of the speaker's position.
Intimidation is another principle of social engineering. Intimidation doesn't have to be valid to be effective โ if the attacker uses intimidation that the target believes is real, they can persuade them to act how they want them to.
Another key principle is consensus. When a group that you identify with all seem to be in agreement, it's easier to be persuaded along with them.
๐ Download the Free Ultimate Security Cert Guide: https://blog.cbt.gg/1ma8
โฌ๏ธ 15-Week Study Plan: CCNP Security Core (350-701 SCOR): https://blog.cbt.gg/atom
Start learning with CBT Nuggets:
โข CompTIA Security+ (SY0-501) | https://courses.cbt.gg/c26
โข Information Security | https://courses.cbt.gg/463
โข Cisco CCNA Security (210-260 IINS) | https://courses.cbt.gg/r6n
In this video, Keith Barker covers some of the social engineering techniques and tactics that hostile actors use. Social engineering isn't simply about stealing data or stealing money, they can also be deployed to compromise the thoughts of a group of people. If an attacker or group could modify the minds and thoughts of tens or hundreds of millions of people, the consequences could be monumental.
The fabric of social media is an ideal attack vector for influence campaigns, in which internet users and their thoughts get targeted. There are underlying reasons that certain social engineering techniques are so effective. These are often called the principles.
The first principle is authority. Humans are hard-wired to be persuaded by people they consider in positions of authority. Crucially, that doesn't mean anyone with any authority. For a speaker's authority to influence someone due to their authority, the listener has to believe in the authority of the speaker's position.
Intimidation is another principle of social engineering. Intimidation doesn't have to be valid to be effective โ if the attacker uses intimidation that the target believes is real, they can persuade them to act how they want them to.
Another key principle is consensus. When a group that you identify with all seem to be in agreement, it's easier to be persuaded along with them.
๐ Download the Free Ultimate Security Cert Guide: https://blog.cbt.gg/1ma8
โฌ๏ธ 15-Week Study Plan: CCNP Security Core (350-701 SCOR): https://blog.cbt.gg/atom
Start learning with CBT Nuggets:
โข CompTIA Security+ (SY0-501) | https://courses.cbt.gg/c26
โข Information Security | https://courses.cbt.gg/463
โข Cisco CCNA Security (210-260 IINS) | https://courses.cbt.gg/r6n
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
6.2K
Likes
150
Duration
4:29
Published
May 31, 2021
User Reviews
4.6
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.