Understanding Social Engineering in Computer Security

Social Engineering in computer security

Understanding Social Engineering in Computer Security



Social Engineering in Computer Security is the art of convincing people to reveal confidential information.

It is the trick used to gain sensitive information by exploiting basic human nature.

Social Engineering attempts to gather sensitive information such as credit card details, social security number, passwords,  other password information among others.

Social Engineering in computer security

There are two types of Social  Engineering


#1 Human-based social Engineering

This does not involve the use of computer technology or device. It has to do with tricking the individual to reveal personal information.



#2 Computer-Based Social Engineering

This has to do with use of computer devices or social media to trick an individual to reveal information that they should have kept secret. That is why one has to be careful about the amount of information that you reveal to a stranger on social media.


Some examples…


“Hi, we are from Oracle Software. we are hiring new people for our software development team. We got your contact number from a popular job portal. Please provide details of your job profile, current project information, social security number and your residential address”


” Hi,I am Mike calling from Citi Bank. Due to the increasing threat perception, we are updating our systems with new security features. Can you provide me with your personal details to verify that you are the real Stella”?


“Thanks, Mike. Here are my details . do you need anything else?”


“Hi, I am John Brown. I’m with the external auditors Arthur Sanderson. We have been told by corporate to do a surprise inspection of your disaster recovery procedures.


You have 10 minutes to show me how you would recover from a website crash.”


” A man calls a company’s help desk and says he has forgotten his password. He adds that if he misses the deadline on a big advertising project, his boss might fire him. 


The help desk worker feels sorry for him and quickly resets the password, unwittingly giving the attacker clear entrance into the corporate network”.


Now your take on this argument.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.

You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.

Click here to Download 5 E-Books that I have taken time to prepare for you.

These E-Books contain formulas that have helped many of my students to nail the PMP Exam at first attempt! You can also make use of this E-Books.


If you have any question while using the material, feel free to shoot me a mail. I am committed to assisting you to nail your PMP exam. It’s a pledge. You can always count on me as a friend. 

PS: For like seven years since I started blogging I have tried many platforms and tools. Some worked and some of them performed below expectation. Here are some of the tools that I will gladly recommend for you any day, any time.




Click here to Like our Page on Facebook

Follow us on Twitter


Domain names for just 88 cents!

3 Major Roles of PMO in Projects 1
Action Point.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.




Adeniyi Salau PMP , CCNA R&S , CDMP, CEP, MOS, MCP, CSCU (Project 2016), Microsoft Certified Security and Networking Associate is a Google and Beingcert Certified Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.

Leave a Reply

Your email address will not be published. Required fields are marked *


CommentLuv badge