Human-Centric Cybersecurity

  1. Social Engineering Attacks
    1. Fundamentals of Social Engineering
      1. Psychological Manipulation Principles
        1. The Social Engineering Kill Chain
          1. Information Gathering
            1. Relationship Building
              1. Exploitation
                1. Execution
                  1. Exit Strategy
                  2. Attack Vector Classification
                    1. Target Selection Criteria
                    2. Principles of Influence and Persuasion
                      1. Reciprocity
                        1. Commitment and Consistency
                          1. Social Proof
                            1. Authority
                              1. Liking and Similarity
                                1. Scarcity
                                  1. Unity and Shared Identity
                                  2. Common Attack Techniques
                                    1. Phishing Attacks
                                      1. Email Phishing
                                        1. Spear Phishing
                                          1. Whaling
                                            1. Clone Phishing
                                              1. Smishing
                                                1. Vishing
                                                2. Pretexting
                                                  1. Identity Impersonation
                                                    1. Scenario Creation
                                                      1. Information Elicitation
                                                      2. Baiting
                                                        1. Physical Media Drops
                                                          1. Digital Baiting
                                                            1. Curiosity Exploitation
                                                            2. Quid Pro Quo
                                                              1. Service Offers
                                                                1. Technical Support Scams
                                                                2. Physical Social Engineering
                                                                  1. Tailgating
                                                                    1. Piggybacking
                                                                      1. Shoulder Surfing
                                                                        1. Dumpster Diving
                                                                      2. Psychology of Victimization
                                                                        1. Emotional Exploitation
                                                                          1. Fear Appeals
                                                                            1. Urgency Creation
                                                                              1. Greed and Opportunity
                                                                                1. Curiosity and Interest
                                                                                2. Trust Building Mechanisms
                                                                                  1. Cognitive Overload Tactics
                                                                                    1. Authority and Credibility Manipulation
                                                                                    2. Defense Against Social Engineering
                                                                                      1. Recognition Training
                                                                                        1. Verification Procedures
                                                                                          1. Reporting Mechanisms
                                                                                            1. Technical Controls
                                                                                              1. Organizational Policies