What type of information is usually gathered by social engineering?

What will be an ideal response?

In computer attacks, the information is usually a password to a network or other information an attacker could use to compromise a network. A salesperson can get personal information about customers, such as income, hobbies, social life, drinking habits, music preferences, and the like, just by asking the customer the right questions. Social engineers might also use persuasion tactics, intimidation, coercion, extortion, and even blackmail to gather the information they need. They are probably the biggest security threat to networks and the most difficult to protect against.

Computer Science & Information Technology

You might also like to view...

Level 3 cache memory is faster than the other cache memory levels

Indicate whether the statement is true or false

Computer Science & Information Technology

Heuristics may produce false positives that mistakenly identify a legitimate file as malware.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology