{"id":18210,"date":"2023-12-27T11:00:54","date_gmt":"2023-12-27T10:00:54","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=18210"},"modified":"2024-01-16T11:40:27","modified_gmt":"2024-01-16T10:40:27","slug":"social-engineering-tauschung-im-cyberraum","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2023\/12\/27\/social-engineering-tauschung-im-cyberraum\/","title":{"rendered":"Social Engineering: Deception in Cyberspace"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_18210 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_18210')){$('.twoclick_social_bookmarks_post_18210').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2023\\\/12\\\/27\\\/social-engineering-tauschung-im-cyberraum\\\/\",\"post_id\":18210,\"post_title_referrer_track\":\"Social+Engineering%3A+Deception+in+Cyberspace\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_18213\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-18213\" class=\"wp-image-18213 size-medium\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/12\/Blog-Layout-2-1-300x200.png\" alt=\"Abstract Concept Illustration of Cyber Security\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/12\/Blog-Layout-2-1-300x200.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/12\/Blog-Layout-2-1-1024x683.png 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/12\/Blog-Layout-2-1-768x512.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/12\/Blog-Layout-2-1-1536x1024.png 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/12\/Blog-Layout-2-1-2048x1365.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-18213\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/www.freepik.com\/free-vector\/steal-data-cyber-attack-concept_7970615.htm\">Freepik<\/a><\/p><\/div><\/p>\n<p>In the world of cyber security, it&#8217;s not just technology that plays a crucial role. People are an equally important factor, and this is where social engineering comes in. This sophisticated method specifically exploits human behaviour and weaknesses to gain access to sensitive data or cause damage.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<h3><span style=\"color: #00549f;\">What Is Social Engineering?<\/span><\/h3>\n<p><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2020\/11\/06\/social-engineering\/\">Social engineering<\/a> exploits human characteristics such as helpfulness, trust, fear, or deference to authority to cleverly manipulate people. The aim is, for example, to disclose confidential information, bypass security functions, make bank transfers or install malware.<\/p>\n<p>The main tactic is to conceal the identity and intentions of the perpetrator. For example, cyber criminals often pretend to be technicians, employees of a well-known company or even familiar people from their social circle.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">The Variety of Forms of Attack<\/span><\/h3>\n<ul>\n<li><strong>Phishing:<\/strong> This is probably one of the best-known forms of social engineering. Criminals send fake emails or create manipulated websites to trick people into revealing confidential data such as passwords or account information.<\/li>\n<li><strong>Spear phishing:<\/strong> This method is more targeted and personalized than phishing. Attacks are tailored to specific groups or even individuals to increase the success rate.<\/li>\n<li><strong>CEO fraud:<\/strong> Here, criminals try to manipulate decision-makers in companies. They pretend to act on behalf of the management and induce employees to transfer large sums of money.<\/li>\n<li><strong>Personal requests:<\/strong> Attackers try to obtain passwords or access to buildings by pretending to be authorized persons.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Recognize and Protect<\/span><\/h3>\n<ul>\n<li><strong>Awareness is key:<\/strong> make yourselves and your employees aware of the various forms of social engineering. Regular education and training can help to recognize attacks at an early stage.<\/li>\n<li><strong>Healthy mistrust:<\/strong> Be sceptical of unexpected requests for sensitive data, especially by email or phone. Reputable companies never ask for such information in this way,<\/li>\n<li><strong>Handle information critically:<\/strong> Think carefully about what personal data you disclose in public spaces, as this can be collected and used by cyber criminals in a targeted manner.<\/li>\n<li><strong>Strengthen security awareness:<\/strong> If you are aware of the risks and are trained accordingly, you and your team can deal with such attacks more safely.<\/li>\n<\/ul>\n<p>Social engineering is a serious threat in the cyber world, as it is based on psychological manipulation that is difficult to detect. However, if you know the tactics and are vigilant, you can significantly minimize the success of such attacks. To counter this threat effectively, both technology and security awareness must be strengthened.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/go\/id\/epvp\/gguid\/PER-FSX9U9J\/allou\/1\/\">Malak Mostafa<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Source:<\/p>\n<p><a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Cyber-Sicherheitslage\/Methoden-der-Cyber-Kriminalitaet\/Social-Engineering\/social-engineering_node.html\">Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":5003,"featured_media":18213,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[306,311,314,315],"tags":[609,621,81,61,866,71],"class_list":["post-18210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ankuendigungen","category-fun-facts","category-it-sicherheit","category-services-support","tag-cyber-security","tag-cybersicherheit","tag-it-security","tag-it-sicherheit","tag-sicherheit","tag-socialengineering"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/18210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/5003"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=18210"}],"version-history":[{"count":10,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/18210\/revisions"}],"predecessor-version":[{"id":18354,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/18210\/revisions\/18354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/18213"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=18210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=18210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=18210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}