Cyber Security

For a post to be substantial, it needs to genuinely add something new to the conversation.  I am sure you will have no trouble writing about your personal experiences or research findings you have made.

Please reply to post -150-250 words

Theauthors state that social engineering technique has a direct link with human interaction and skills. I agree with the discussed methods to prevent social engineering attacks. Teaching the end user is the best way to overcome the attack. Since the attacker targets the end user, focusing on the direct victim becomes the exact scenario that should be taken. The writers’ repeatedly warns how humans are weak to be cheated by the most tactical attackers (Whitman & Mattord, 2018, p.82).

Let’s see pretexting example, a friend of mine got a call from someone and saying as if he was calling from IRS since my friend reports wrong information. My friend believed him and asked me what to do. He got another call again but positive one. He was told he will get money as he has never committed a crime in this country. I also have the same experience in phishing. Therefore, educating the end user is the best approach to control social engineering attacks.

Whitman and Mattord (2018) sated “People are the weakest link. You can have the best technology; firewalls,intrusion-detection systems, biometric devices…and somebody can call an unsuspecting employee. That’s all she wrote, baby. They got everything.20” (p.82).


Whitman, M.E., & Mattord, H. J. (2018). Principles of Information Security (6th ed.). Boston, MA: Cengage Learning.