Social Engineering
attacks
Shoulder surfing
Physical access to workstations
Masquerading as a user
Masquerading as a monitoring staff
Dumpster diving
Reverse social engineering
Baiting
Ex: leave a CD-ROM disk in a public place
Rely on natural human curiosity when presented with an unknown
Phishing
fake e-mails, which request a user to connect to an illegitimate site
Some phishing attacks target victims through the phone
Pretexting