What is social engineering
Last updated: April 1, 2026
Key Facts
- Social engineering attacks exploit human psychology, emotions, and trust to bypass security measures
- Common tactics include phishing, pretexting, baiting, tailgating, and quid pro quo schemes
- Social engineering requires no technical hacking skills and can be executed through phone calls, emails, or in-person interactions
- It is one of the most effective attack vectors because humans are typically the weakest link in security
- The most effective defense against social engineering is employee awareness training, strong security policies, and verification procedures
Overview
Social engineering is a broad category of malicious activities aimed at tricking or manipulating people into divulging confidential information or performing actions that compromise security. Unlike technical hacking that targets system vulnerabilities, social engineering exploits human psychology, emotions, and inherent trust to achieve its goals. Attackers use social engineering to gain unauthorized access to systems, steal data, commit fraud, or cause other harmful outcomes.
Common Social Engineering Tactics
Phishing involves sending fraudulent emails or messages that appear to come from legitimate organizations, tricking recipients into clicking malicious links or entering credentials. Pretexting is creating a fabricated scenario to build false trust and extract information, such as posing as IT support. Baiting offers something enticing to lure victims into a trap, like leaving USB drives in public places. Tailgating or piggybacking involves following authorized personnel through secure doors without proper credentials. Quid pro quo schemes promise services or benefits in exchange for information or access.
Psychological Manipulation Techniques
Social engineers exploit fundamental human vulnerabilities and psychological principles. Authority is used by impersonating figures of authority like managers or law enforcement. Urgency creates pressure to act quickly without proper verification, such as claiming an account will be closed immediately. Scarcity suggests limited opportunities to force quick decisions. Reciprocity leverages the human tendency to return favors. Trust and liking are built through establishing rapport before making the actual request. Understanding these psychological principles helps explain why social engineering is so effective.
Real-World Examples and Impact
Social engineering attacks have led to major security breaches affecting millions of people. Attackers have compromised corporate networks by convincing employees to download infected attachments or reveal passwords. Financial institutions have lost significant funds through social engineering-based wire fraud. Government agencies and defense contractors have been targeted with spear phishing campaigns. The 2011 RSA security breach, which gave attackers access to advanced security credentials, was initiated through a social engineering attack. Healthcare organizations have had patient data stolen through social engineering schemes.
Defense and Prevention Strategies
Employee training is the most critical defense, with regular education about social engineering tactics and how to recognize them. Verification procedures require confirming identities through multiple channels before releasing information or access. Security policies should establish clear protocols for handling requests, especially those involving sensitive information or system access. Technical controls like email filtering, multi-factor authentication, and access restrictions limit damage if someone falls victim. Incident reporting systems allow employees to report suspicious activity for investigation.
Evolution and Modern Threats
Social engineering tactics have evolved with technology. Spear phishing targets specific individuals with personalized information gathered from social media and public sources. Business email compromise (BEC) attacks use sophisticated pretexting to impersonate executives requesting wire transfers. Voice phishing (vishing) uses phone calls with spoofed numbers to appear legitimate. Smishing uses SMS text messages to deliver malicious links. Deepfakes and synthetic media create convincing fake videos of authority figures. As technical security improves, social engineering remains a primary attack vector because human manipulation is inherently difficult to prevent.
Related Questions
What is the difference between phishing and spear phishing?
Phishing sends generic fraudulent messages to many people hoping some will respond. Spear phishing is a targeted attack against specific individuals using personalized information, making it more effective and difficult to detect.
How can I protect myself from social engineering?
Verify requests through independent channels, avoid sharing sensitive information with unknown parties, be skeptical of urgent requests, use strong authentication, and keep software updated. Never click links in unsolicited messages or open suspicious attachments.
Is social engineering illegal?
Social engineering itself may not be illegal, but the activities it enables usually are. Using social engineering to gain unauthorized computer access, commit fraud, or steal data violates computer fraud and cybercrime laws in most jurisdictions.
More What Is in Daily Life
- What Is a Credit ScoreA credit score is a three-digit number, typically ranging from 300 to 850, that represents your cred…
- What Is CD rates make no sense based on length of time invested. Explain like I'm 5CD (Certificate of Deposit) rates often don't increase with longer lock-up times the way people expe…
- What is a phdA PhD (Doctor of Philosophy) is a doctoral degree earned after completing advanced academic research…
- What is a polymathA polymath is a person with deep knowledge and expertise across multiple different fields or academi…
- What is aaveAAVE stands for African American Vernacular English, a dialect with distinct grammar, pronunciation,…
- What is aarch64ARMv8-A (commonly called ARM64 or AArch64) is a 64-bit processor architecture developed by ARM Holdi…
- What is about menTopics and discussions about men typically encompass masculinity, male identity, gender roles, men's…
- What is abiturAbitur is the German academic qualification awarded upon completion of secondary education, typicall…
- What is abrosexualAbrosexual is a sexual orientation identity where a person's sexual attraction changes or fluctuates…
- What is abgABG is an Indonesian acronym standing for 'Anak Baru Gede,' which refers to adolescent girls or teen…
- What is aaaAAA batteries are a standard cylindrical battery size measuring 10.5mm in diameter and 44.5mm in len…
- What is aacAAC (Advanced Audio Codec) is a digital audio compression format that provides better sound quality …
- What is aaa gameAAA games are high-budget video games developed by large studios with budgets typically exceeding $1…
- What is a proxyA proxy is a server that acts as an intermediary between your device and the internet, forwarding yo…
- What is ableismAbleism is discrimination and prejudice against people with disabilities based on the assumption tha…
- What is absAbs, short for abdominal muscles, are the muscles in your core that flex your spine and stabilize yo…
- What is abortionAbortion is a medical procedure that ends pregnancy by removing the fetus before viability. It can b…
- What is accutaneAccutane (isotretinoin) is a powerful prescription medication derived from vitamin A used to treat s…
- What is acetaminophenAcetaminophen, also known as paracetamol, is an over-the-counter pain reliever and fever reducer use…
- What is acidAcid is a chemical substance that donates protons (hydrogen ions) to other substances, characterized…
Also in Daily Life
- How To Save Money
- Why are so many white supremacist and right wings grifters not white
- Does "I'm 20 out" mean youre 20 minutes away from where you left, or youre 20 minutes away from your destination
- Why are so many men convinced that they are ugly
- What does awol mean
- What does asl mean
- What does ad mean
- What does asap mean
- What does apex mean
- What does asmr stand for
- What does atp mean
- What causes autism
- What does abg mean
- What does am and pm mean
- What does a fox sound like
More "What Is" Questions
Trending on WhatAnswer
Browse by Topic
Browse by Question Type
Sources
- Wikipedia - Social Engineering (Security) CC-BY-SA-4.0
- CISA - Social Engineering Attacks Public Domain