Social engineering, in the realm of security[1], is a tactic used by malicious actors to exploit human psychology, often leveraging cognitive biases, to gain access to confidential information or systems. This method often involves tactics such as pretexting, water holing, and baiting. Incidents such as the Equifax attack underline the rising prominence of social engineering attacks. The technique has been used by individuals like Susan Headley and Mike Ridpath for different purposes. Laws like the Gramm-Leach-Bliley Act have been enacted to curb this invasion of privacy[2]. The phenomenon presents a significant threat to information security, necessitating the development of detection techniques, cybersecurity education, and legislation to prevent deceptive practices and protect sensitive information.
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests."
Research done in 2020 has indicated that social engineering will be one of the most prominent challenges of the upcoming decade. Having proficiency in social engineering will be increasingly important for organizations and countries, due to the impact on geopolitics as well. Social engineering raises the question of whether our decisions will be accurately informed if our primary information is engineered and biased.
Social engineering attacks have been increasing in intensity and number, cementing the need for novel detection techniques and cyber security educational programs.