Violating Trust - Social Engineering Past and Present
Offered By: YouTube
Course Description
Overview
Explore the history and techniques of social engineering in this conference talk that delves into the concept of violating trust. Learn about the components involved in establishing trust, including the affect heuristic, appearance, stereotypes, and credentials. Discover how con artists employ buildup ruses and exploit feelings of obligation to manipulate their victims. Examine case studies like "The Butterine Kid" and "The Yellow Kid" to understand the characters and methods used in past and present social engineering schemes. Gain insights into ID verification processes and the psychology behind trustworthy actions. Equip yourself with knowledge to recognize and protect against social engineering tactics in both personal and professional settings.
Syllabus
Violating Trust
Usual Disclaimer
The big picture
Characters
The "Butterine Kid" vs "The Yellow Kid"
Components in Establishing Trust • Affect Heuristic - Appearance, stereotypes and "gut" feeling
Appearance and Stereotypes
Same person, different messages
Credentials (Identification)
ID Verification
Trustworthy Actions - Many cons employ a buildup ruse to gain the victim's trust. This may involve monetary gains or actions that engender trust - Approaching a gatekeeper with a "lost item" - Tailgating?
Obligation - People feel obligation to reciprocate generous actions, even if the gesture is token
Resources
Questions?
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX