This document discusses social engineering techniques used by attackers to trick people into divulging sensitive information or performing actions. It defines key terms and explains why social engineering is a threat even for organizations with strong technical security controls. Common social engineering attack methods are described in detail, including phishing emails, phone calls, dropping infected USB drives, and impersonation. The document emphasizes that education is needed to help people recognize and avoid social engineering tactics.