Cybersecurity CS Thinking Example 3
Follow the full solution, then compare it with the other examples linked below.
Example 3
mediumExplain what social engineering is and give two examples. Why is it effective even against systems with strong technical security?
Solution
- 1 Step 1: Social engineering manipulates people (rather than technology) to gain access. Example 1: calling an employee pretending to be IT support and asking for their password. Example 2: tailgating โ following an authorised person through a secure door.
- 2 Step 2: It is effective because humans are often the weakest link. Even the strongest encryption and firewalls cannot prevent an employee from voluntarily giving away their password to a convincing attacker.
Answer
Social engineering exploits people, not technology. Examples: pretexting (fake IT support), tailgating. It bypasses technical defences by targeting human trust and helpfulness.
Social engineering accounts for a large percentage of successful cyber attacks. Training users to recognise and resist social engineering is as important as technical security measures.
About Cybersecurity
The practice of protecting computing systems, networks, and data from unauthorized access, attacks, and damage. Cybersecurity encompasses three core goals: confidentiality (only authorized users can access data), integrity (data is not tampered with), and availability (systems remain operational).
Learn more about Cybersecurity โMore Cybersecurity Examples
Example 1 easy
Name three common cyber threats and describe how each works.
Example 2 mediumExplain three methods of protecting against cyber attacks: encryption, authentication, and firewalls
Example 4 hardA company suffers a data breach exposing customer emails and hashed passwords. Explain why hashing p