Sosyal Mühendislik

High-quality technical overview of Social Engineering in the context of blockchain security.

Profiles: 1. Malicious (Revenge/Profit). 2. Negligent (Accident/Ignoarance). 3. Compromised (Identity stolen). 4. Mules (Coerced).

        graph LR
  Center["Sosyal Mühendislik"]:::main
  Rel_cybersecurity["cybersecurity"]:::related -.-> Center
  click Rel_cybersecurity "/terms/cybersecurity"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 5 yaşındaki gibi açıkla

Bilgisayarınıza hiç girmek zorunda kalmadan, ev anahtarlarınızı veya şifrenizi vermeniz için sizi ikna etmek amacıyla tamirci veya banka görevlisi gibi davranan bir dolandırıcı gibidir.

🤓 Expert Deep Dive

Technically, insider attacks are identified through 'Anomalous Behavior Patterns'. Since the attacker uses legitimate credentials, security teams must look for 'Lateral Movement' (trying to access folders they don't usually need) or 'Data Staging' (gathering lots of files in one place before sending them out). The 'Zero Trust' model is the primary defense, which operates on the assumption that even people inside the network should be continuously verified. Advanced defenses use UEBA (User and Entity Behavior Analytics) to flag an employee who suddenly starts logging in at 3 AM or accessing HR records when they work in Engineering.

📚 Kaynaklar