[{"data":1,"prerenderedAt":73},["ShallowReactive",2],{"term-s\u002Fsocial-engineering":3,"related-s\u002Fsocial-engineering":59},{"id":4,"title":5,"acronym":6,"body":7,"category":40,"description":41,"difficulty":42,"extension":43,"letter":44,"meta":45,"navigation":46,"path":47,"related":48,"seo":53,"sitemap":54,"stem":57,"subcategory":6,"__hash__":58},"terms\u002Fterms\u002Fs\u002Fsocial-engineering.md","Social Engineering",null,{"type":8,"value":9,"toc":33},"minimark",[10,15,19,23,26,30],[11,12,14],"h2",{"id":13},"eli5-the-vibe-check","ELI5 — The Vibe Check",[16,17,18],"p",{},"Social engineering is hacking people, not computers. Instead of breaking through technical defenses, attackers manipulate humans into giving up access or information. 'Hi, I'm from IT support, I need your password to fix your account' is social engineering. Technology can't fully protect against human gullibility.",[11,20,22],{"id":21},"real-talk","Real Talk",[16,24,25],{},"Social engineering exploits psychological manipulation rather than technical vulnerabilities. Techniques include phishing (email), vishing (voice calls), smishing (SMS), pretexting (fabricated scenarios), and baiting. It's often the easiest path into a well-secured system because humans are the weakest link.",[11,27,29],{"id":28},"when-youll-hear-this","When You'll Hear This",[16,31,32],{},"\"The breach started with a social engineering call to the help desk.\" \u002F \"Security training reduces social engineering success rates.\"",{"title":34,"searchDepth":35,"depth":35,"links":36},"",2,[37,38,39],{"id":13,"depth":35,"text":14},{"id":21,"depth":35,"text":22},{"id":28,"depth":35,"text":29},"security","Social engineering is hacking people, not computers.","beginner","md","s",{},true,"\u002Fterms\u002Fs\u002Fsocial-engineering",[49,50,51,52],"Phishing","Two-Factor Authentication","MFA","Security Audit",{"title":5,"description":41},{"changefreq":55,"priority":56},"weekly",0.7,"terms\u002Fs\u002Fsocial-engineering","PiBSHbIcnAfDWbO4u2IBBIE9ADSl5BaWNlYA8Z63zsU",[60,63,66,69],{"title":51,"path":61,"acronym":51,"category":40,"difficulty":42,"description":62},"\u002Fterms\u002Fm\u002Fmfa","MFA stands for Multi-Factor Authentication. It's the umbrella term for requiring multiple proofs of identity. 2FA is MFA with exactly two factors.",{"title":49,"path":64,"acronym":6,"category":40,"difficulty":42,"description":65},"\u002Fterms\u002Fp\u002Fphishing","Phishing is when hackers pretend to be someone you trust — your bank, your boss, Google — to trick you into giving up your password or clicking a bad link.",{"title":52,"path":67,"acronym":6,"category":40,"difficulty":42,"description":68},"\u002Fterms\u002Fs\u002Fsecurity-audit","A security audit is a systematic review of your code, infrastructure, and processes to find security weaknesses.",{"title":50,"path":70,"acronym":71,"category":40,"difficulty":42,"description":72},"\u002Fterms\u002Ft\u002Ftwo-factor-authentication","2FA","2FA means you need two things to log in: something you know (password) and something you have (your phone).",1776518314100]