Conclusion

Now, within the scope of these few pages, I could spend endless chapters providing examples and detailed descriptions of both the physical and automated attacks that could attack your organization. But, to be honest, the internet is littered with thousands of them, all of which can be found by a simple Google or YouTube search.

Within the scope of these few pages, I've tried to provide a description of what social engineering is and how its many facets can be used to cause malicious damage. So, the question you're asking now is probably, how on earth can I defend myself from these attacks right?

To be honest, there's no golden ticket here. The modern cybercriminal has become a professional, and the task of exploiting countless ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.