Why Thirty-Six Social Engineer Stratagems?
As organization/nation-states are strengthened software and network aspect of cyber defenses, attackers have to look for other ways to access data.
Cyber attacks like all forms of warfare are ever escalating. In 2003, phishing introduced the art of social engineering into information security world. An email, that informed users of their password expiration, has opened up a new battlefront.
For a more sophisticate and escalate data breach, a master plan will be required, numerous stratagems are hatched to deal with various scenario, and vast numbers of bots will provide ample firepower.
An objective for this slide is to provide food for thoughts to InfoSec Pro (Information Security Professions) to recognize patterns and hopefully come up with means to deal with them.