SERVFORU

Social engineering ; A career


social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.

When most people hear "Social Engineering," they think of the criminal aspects of the term. But the practice also has professional applications for security practitioners who want to help test and improve organizations' security practices.
Being able to determine which type of job you are seeking is crucial. In-house and contract employees have different challenges.. Recent contract wins and any enforcement action should be noted, as well as awards and recognition for outstanding work and employee satisfaction. Purchases and sales of smaller companies are a good indicator of business growth opportunities, as well as knowledge about skills important to the company.
In order to gain internal information about the company, try to get personal interaction with employees of your target. Human Resources departments sometimes hold job fairs or community outreach allowing you to get more information about the employees and their opinions. Research into newsgroups and mailing lists can turn up topics of interest to the company. Knowledge of regulatory environments for the company's customers is critical for interview stages.



This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, 

Social engineering undoubtedly is an integral aspect of information security and is a growing, respectable career field for professionals who value information security awareness and wish to play an active role in protecting security controls that govern the processes, operations, and transactions of any organization and add a distinct value within the institutional culture that informs and influences employee behavior. Social engineers are hired on both contract and permanent basis by independent IT/ Security consulting companies and government agencies to target client organizations in order to identify vulnerabilities that could cause important information to be compromised from their respective networks and system and thereby provide them with guidelines and recommendations to prevent this security threat.



  • Researching for rewards


  • Use Public Relations and Human Resource departments to gain personal interaction with employees.


  • Job fairs and outreach programs are a good way to gain face time with the target company.


  • Internships are a great way in for candidates recently out of educational work.
    Making the contacts


  • Blend in for personal interaction, and be flexible with your responses.


  • Try to keep talking at a higher level; don't overload the person with all your skills.


  • Find out background information, such as compliance or regulatory environments.


  • Be aware of contractual issues within a particular job or industry.
  • Share this article :
     

    + comments + 3 comments

    Anonymous
    April 9, 2013 at 11:23 AM

    Hello, i read your blog from time to time and i own a similar
    one and i was just curious if you get a lot of spam responses?

    If so how do you reduce it, any plugin or anything you can recommend?
    I get so much lately it's driving me mad so any help is very much appreciated.

    Look at my site :: exercises for vertical jump

    Anonymous
    April 25, 2013 at 9:46 AM

    Very good article! We are linking to this great article on our website.
    Keep up the great writing.

    Here is my website ... mimanso.net

    Anonymous
    April 26, 2013 at 6:33 AM

    Ahaa, its nice dialogue about this paragraph here at this weblog, I have read all
    that, so at this time me also commenting at this place.


    My page ... thespellblog.com

    Post a Comment

     
    Support : Ebin EPhrem | Ebin Ephrem | #Gabbarism
    Copyright © 2011. Services | Embedded Support | Reviews | Virtual Technologys - All Rights Reserved
    Template Created by ebinephrem.com Published by Ebin Ephrem
    Proudly powered by Blogger