When it comes to Social Engineering what makes it so difficult to manage?
What exactly is Social engineering and what are some of it’s principles?
What is phishing and how does it work?
What is Spear phishing and how does it work?
What is impersonation and how does it work?
What is shoulder surfing and how can it be used to gain access to your sensitive data?
What is tailgating and what are some examples of it in use?
What is dumpster diving?