Social engineering attacks life cycle

One of the most explanatory social engineering attack life cycles, among many offered, is the one proposed as follows, refer to point 8 under the References section. :

Social engineering attack life cycle

The paper introduces new social engineering attack life cycle which includes the following steps: Attack Formulation, Information Gathering, Preparation, Developing relationship, Exploit relationship, and Debrief. Refer to point 8 under the References section, for more information on this model.

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.