Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Violating Trust - Social Engineering Past and Present

via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
Explore the history and techniques of social engineering in this conference talk that delves into the concept of violating trust. Learn about the components involved in establishing trust, including the affect heuristic, appearance, stereotypes, and credentials. Discover how con artists employ buildup ruses and exploit feelings of obligation to manipulate their victims. Examine case studies like "The Butterine Kid" and "The Yellow Kid" to understand the characters and methods used in past and present social engineering schemes. Gain insights into ID verification processes and the psychology behind trustworthy actions. Equip yourself with knowledge to recognize and protect against social engineering tactics in both personal and professional settings.

Syllabus

Violating Trust
Usual Disclaimer
The big picture
Characters
The "Butterine Kid" vs "The Yellow Kid"
Components in Establishing Trust • Affect Heuristic - Appearance, stereotypes and "gut" feeling
Appearance and Stereotypes
Same person, different messages
Credentials (Identification)
ID Verification
Trustworthy Actions - Many cons employ a buildup ruse to gain the victim's trust. This may involve monetary gains or actions that engender trust - Approaching a gatekeeper with a "lost item" - Tailgating?
Obligation - People feel obligation to reciprocate generous actions, even if the gesture is token
Resources
Questions?

Reviews

Start your review of Violating Trust - Social Engineering Past and Present

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.