Understanding Social Engineering: A Human-Centric Threat

Last updated: October 31, 2024
Understanding Social Engineering: A Human-Centric Threat

Social engineering, a term often misunderstood, is not about hacking computers or cracking codes. It's a psychological manipulation tactic, often employed by cybercriminals to trick individuals into divulging sensitive information or performing actions that can compromise security. This form of attack leverages the inherent trust and vulnerability of humans to gain unauthorized access to systems or data.

The Human Element

At the core of social engineering lies the exploitation of human nature. Criminals capitalize on our innate trust, curiosity, and fear to manipulate our actions. They often employ tactics that play on our emotions, such as creating a sense of urgency, fear, or sympathy. By understanding these psychological vulnerabilities, we can better protect ourselves and the university from social engineering attacks.

Common Social Engineering Tactics

  1. Phishing: One of the most common social engineering tactics, phishing involves sending deceptive emails or messages that appear to be from legitimate sources. These messages often contain malicious links or attachments that, when clicked or downloaded, can infect devices with malware or steal personal information.
  2. Pretexting: Pretexting involves creating a false scenario or pretext to gain trust and extract information. For example, a scammer might pose as a bank representative or a tech support employee to trick a victim into revealing sensitive data.
  3. Quid Pro Quo: A quid pro quo attack involves offering a favor or benefit in exchange for something valuable, such as personal information or access to systems. This tactic can be particularly effective when the offer seems too good to be true.

Tips for Defending Against Social Engineering

  1. Be Skeptical: Approach unsolicited communications with caution. Verify the sender's identity before responding or clicking on links. Be wary of messages that create a sense of urgency or fear.
  2. Educate Yourself: Stay informed about the latest social engineering tactics and best practices for online safety by bookmarking the Privacy Matters @ UBC website. Attend privacy and information security workshops and stay up-to-date on cybersecurity news.
  3. Use Strong Passwords: Avoid using easily guessable passwords and enable multi-factor authentication whenever possible. Strong passwords can make it difficult for attackers to gain unauthorized access to your accounts.
  4. Report Suspicious Activity: If you encounter a suspicious email, message, or phone call, report it to security@ubc.ca. By reporting suspicious activity, you can help prevent others from falling victim to social engineering attacks.

By understanding the tactics used by social engineers and taking proactive steps to protect yourself, you can significantly reduce your risk of falling victim to these attacks. Remember, the most effective defence against social engineering is a combination of awareness, vigilance, and strong security practices.


Go Further


  • Article

UBC Crest The official logo of the University of British Columbia. Urgent Message An exclamation mark in a speech bubble. Caret An arrowhead indicating direction. Arrow An arrow indicating direction. Arrow in Circle An arrow indicating direction. Arrow in Circle An arrow indicating direction. Chats Two speech clouds. Facebook The logo for the Facebook social media service. Information The letter 'i' in a circle. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Location Pin A map location pin. Mail An envelope. Menu Three horizontal lines indicating a menu. Minus A minus sign. Telephone An antique telephone. Plus A plus symbol indicating more or the ability to add. Search A magnifying glass. Twitter The logo for the Twitter social media service. Youtube The logo for the YouTube video sharing service. Bell Warning