Violating Trust - Social Engineering Past and Present

Violating Trust - Social Engineering Past and Present

via YouTube Direct link

Violating Trust

1 of 14

1 of 14

Violating Trust

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Violating Trust - Social Engineering Past and Present

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Violating Trust
  2. 2 Usual Disclaimer
  3. 3 The big picture
  4. 4 Characters
  5. 5 The "Butterine Kid" vs "The Yellow Kid"
  6. 6 Components in Establishing Trust • Affect Heuristic - Appearance, stereotypes and "gut" feeling
  7. 7 Appearance and Stereotypes
  8. 8 Same person, different messages
  9. 9 Credentials (Identification)
  10. 10 ID Verification
  11. 11 Trustworthy Actions - Many cons employ a buildup ruse to gain the victim's trust. This may involve monetary gains or actions that engender trust - Approaching a gatekeeper with a "lost item" - Tailga…
  12. 12 Obligation - People feel obligation to reciprocate generous actions, even if the gesture is token
  13. 13 Resources
  14. 14 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.