Describe conformity as a social engineering technique.

What will be an ideal response?

This method hinges on the general tendency of people to believe that an apparent similarity between themselves and another (unknown) person is an actual similarity. The hacker convinces the victim that they have a lot in common and that they share the same values. The hacker becomes the victim's good friend by appearing honest,trustworthy,and friendly. This is a person in whom one may truly confide. Once the information is garnered, the "good friend" just disengages.

Computer Science & Information Technology

You might also like to view...

When and where was the C language invented?

What will be an ideal response?

Computer Science & Information Technology

If you have multiple graphics displaying on the screen and would like them to overlap, you can change their ____ order by using commands on the Bring Forward and Send Backward menus.

A. display B. control C. positioning D. stacking

Computer Science & Information Technology