46.0k views
4 votes
What are the steps involved in social engineering?

1) Information gathering, development of a relationship, exploitation of relationship, execution to achieve objective
2) Information gathering, exploitation of relationship, development of a relationship, execution to achieve objective
3) Development of a relationship, information gathering, exploitation of relationship, execution to achieve objective
4) Development of a relationship, exploitation of relationship, information gathering, execution to achieve objective

1 Answer

4 votes

Final answer:

In social engineering, the steps are: information gathering, development of a relationship, exploitation of that relationship, and finally, execution to achieve the desired objective. The correct sequence corresponds to option one.

Step-by-step explanation:

The steps involved in social engineering follow a systematic approach similar to the scientific method, but with the aim of manipulating individuals to gain unauthorized access to information or systems. The correct sequence of steps is:

  1. Information gathering: This step involves collecting information about the target to understand their behaviors, requirements, and vulnerabilities.
  2. Development of a relationship: After gathering sufficient information, the attacker establishes a rapport with the target to gain trust.
  3. Exploitation of relationship: The trust gained is then exploited to manipulate the target into divulging confidential information or performing actions that compromise security.
  4. Execution to achieve objective: Finally, the attacker uses the information or access gained to achieve their malicious objectives.

Therefore, the correct answer is: 1) Information gathering, 2) Development of a relationship, 3) Exploitation of relationship, 4) Execution to achieve objective. This means the first option presented is the correct sequence for a social engineering attack.

User Prayagupadhyay
by
8.0k points