Join Mike Chapple for an in-depth discussion in this video Physical social engineering, part of CompTIA Security+ Exam Prep (SY0-401): Threats and Vulnerabilities.
- Social engineers usually carry out…their attacks by electronic means,…but sometimes they go out into the real world…and engage in physical attacks.…Let's take a look at three ways…that social engineers engage in physical attacks.…Shoulder surfing, dumpster diving, and tailgating.…The first of these, shoulder surfing, is pretty simple.…The attacker simply looks over the shoulder of the victim…as they do something sensitive on their computer.…These attacks might not be as obvious as the one…in the photo here.…
For example, someone sitting next to an employee…on a train or bus might casually glance…at an open laptop screen and monitor activity.…The two best solutions to shoulder surfing…are simply being aware of who is around you…and using special privacy filters on laptop screens…that prevent someone from reading the screen at an angle.…Trash is gold, especially to a social engineer.…Organizations throw away all sorts of sensitive information,…and social engineers love to engage in an activity…known as dumpster diving.…
NOTE: We are now a CompTIA Content Publishing Partner. Our training prepares members to pass CompTIA certification exams and become qualified IT professionals. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Comparing viruses, worms, and Trojans
- Understanding backdoors and logic bombs
- Defending against denial of service and password attacks
- Preventing insider threats
- Detecting social engineering attacks
- Preventing wireless eavesdropping
- Understanding cross-site scripting
- Preventing SQL injection
- Deterring attacks
- Securing your network
- Scanning for and assessing threats
Skill Level Intermediate
2. Understanding Attack Types
3. Social Engineering Attacks
4. Wireless Attacks
5. Application Attacks
6. Mitigation and Deterrence
7. Discovering Threats and Vulnerabilities
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.