1. Unusual or unexpected behavior: If someone is acting strangely or unusually, such as asking too many personal questions or insisting on gaining access to sensitive information or systems, it might be a sign of a social engineering attack.
2. Pressure or urgency: Social engineering attacks often involve creating a sense of urgency or pressure to manipulate victims into making hasty or irrational decisions. If someone is pressuring you to provide sensitive information or take immediate action without giving you time to think, it could be a red flag.
3. Suspicious communication methods: Social engineering attacks commonly occur through email, phone calls, or even in person. If you receive unsolicited emails or calls requesting personal information, passwords, or financial details from unknown or suspicious sources, it is best to be cautious and verify the identity and legitimacy of the individuals before sharing any sensitive information.
3. As you know. human security attacks are made via social engineering List any three ways you can spot social engineering attacks - asked
answer in simple world
1 answer