Statements (59)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Profession
|
gptkbp:aimsTo |
Obtain confidential information
|
gptkbp:canBe |
Email
Social media Public records Networking events Phone calls Ethical A strategist A career path A consultant A researcher A trainer In-person interactions |
gptkbp:canLeadTo |
Data breaches
Financial loss Identity theft Trust_exploitation |
https://www.w3.org/2000/01/rdf-schema#label |
Social Engineer
|
gptkbp:isConsidered |
A threat
A form of hacking A skill set |
gptkbp:isInvolvedIn |
Policy development
Risk assessment Training programs Incident response Awareness campaigns Security awareness training |
gptkbp:isNear |
Always illegal
|
gptkbp:isOftenUsedIn |
Collaborative
Dynamic Challenging Creative Misunderstood Malicious Undercover |
gptkbp:isPartOf |
Risk management
Fraud prevention Cybersecurity field |
gptkbp:isRelatedTo |
Cybersecurity
Information security |
gptkbp:isSubjectTo |
Ethical guidelines
Legal regulations |
gptkbp:isTrainedIn |
Social engineering techniques
|
gptkbp:mayHave |
Role-playing
Scenario planning |
gptkbp:requires |
Communication skills
Critical thinking Empathy |
gptkbp:targets |
Individuals
Organizations |
gptkbp:uses |
Psychological manipulation
|
gptkbp:utilizes |
Social skills
|
gptkbp:worksWith |
Law enforcement
Tailgating Baiting Security teams Pretexting Phishing techniques |