{"id":2595,"date":"2021-03-16T18:22:20","date_gmt":"2021-03-16T18:22:20","guid":{"rendered":"https:\/\/rpbg.com\/rpbg\/?p=2595"},"modified":"2021-03-16T18:23:06","modified_gmt":"2021-03-16T18:23:06","slug":"social-engineering-wees-op-uw-hoede","status":"publish","type":"post","link":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/","title":{"rendered":"Social Engineering? Wees op uw hoede&#8230;"},"content":{"rendered":"\n<p>Deze keer hebben we het graag over &#8216;Social Engineering&#8217; omdat weinig van ons weten wat het is maar velen toch dagelijks ermee in aanraking komen. Binnen de IT-wereld is er sprake van een driehoeksrelatie: hardware, software en de niet-weg-te-denken \u201chumanware\u201d (geen offici\u00eble term hier). De mens wordt in de IT-wereld nog altijd beschouwd als de zwakste schakel, wat hem\/haar automatisch tot de beste \u201ctarget\u201d van de cybercrimineel heeft gemaakt. En al die technieken die door hen worden ingezet om via die gebruikers computersystemen te hacken worden onder een nieuw verzamelnaam geplaatst, namelijk <strong>\u201cSocial Engineering\u201d<\/strong>.<\/p>\n\n\n\n<p><br>Binnen Social Engineering worden er drie soorten technieken onderscheiden: persoonlijke, telefonische en digitale. Voor nu sommen wij de digitale technieken op.<\/p>\n\n\n\n<p><strong>Social Engineering Digitale Technieken<\/strong><\/p>\n\n\n\n<p><strong>Pretexting:<\/strong> Wanneer iemand een mail verstuurt met een domeinnaam die vertrouwd lijkt en afkomstig is van een persoon binnen dat domein. Vaak is aan dit bericht een bijlage toegevoegd die een malware bevat.<\/p>\n\n\n\n<p><strong>Phishing:<\/strong> Wanneer iemand een nabootsing van een bekende website of diensten publiceert, om jouw vertrouwen in te winnen. Deze websites vragen vaak via forms persoonlijke informatie op en bieden downloads aan die malware bevatten.<\/p>\n\n\n\n<p><strong>Social Media Phishing:<\/strong> Wanneer iemand een social media website nabootst om jou vertrouwen in te winnen. Deze websites zullen relevante content beschikbaar stellen waarop je zou klikken en malware bestanden download.<\/p>\n\n\n\n<p><strong>Reverse Engineering:<\/strong> Wanneer iemand aanvallen uitvoert op uw bedrijfsomgeving om zo gevoelige zaken en\/of gaten in de netwerkbeveiliging tentoon te stellen. Hierna wordt met het bedrijf contact gemaakt om dit zogenaamd op te lossen.<\/p>\n\n\n\n<p><strong>Typosquatting:<\/strong> Wanneer iemand bekende typos van brand URLs nabootst, om uw vertrouwen te winnen. De namaak-website kan gemakkelijk persoonlijke informatie van de bezoeker verzamelen, als de typo niet herkend wordt.<\/p>\n\n\n\n<p><strong>Friendly E-mails:<\/strong> Wanneer iemand u e-mailberichten toestuurt van een gehackte account van een kennis of een namaak-account cre\u00ebert met de naam van jouw vriend of kennis. Vaak genoeg is er een bijlage toegevoegd waarin een malware verborgen zit.<\/p>\n\n\n\n<p>Weten dat er gevaar schuilt is nog lang niet voldoende. Het is in uw eigen belang dat u ook goed oplet en zodoende voorkomt dat u ook slachtoffer wordt van cybercrime.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deze keer hebben we het graag over &#8216;Social Engineering&#8217; omdat weinig van ons weten wat het is maar velen toch dagelijks ermee in aanraking komen. Binnen de IT-wereld is er sprake van een driehoeksrelatie: hardware, software en de niet-weg-te-denken \u201chumanware\u201d (geen offici\u00eble term hier). De mens wordt in de IT-wereld nog altijd beschouwd als de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2596,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[25],"tags":[],"class_list":["post-2595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Engineering? Wees op uw hoede... - RPBG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering? Wees op uw hoede... - RPBG\" \/>\n<meta property=\"og:description\" content=\"Deze keer hebben we het graag over &#8216;Social Engineering&#8217; omdat weinig van ons weten wat het is maar velen toch dagelijks ermee in aanraking komen. Binnen de IT-wereld is er sprake van een driehoeksrelatie: hardware, software en de niet-weg-te-denken \u201chumanware\u201d (geen offici\u00eble term hier). De mens wordt in de IT-wereld nog altijd beschouwd als de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/\" \/>\n<meta property=\"og:site_name\" content=\"RPBG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RPBG.ICT\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-16T18:22:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-16T18:23:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rpbg.com\/rpbg\/wp-content\/uploads\/2021\/03\/RPBG_awareness-ad_social-engineering-1024x723-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"723\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RPBG\" \/>\n<meta name=\"twitter:site\" content=\"@RPBG\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuten\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering? Wees op uw hoede... - RPBG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/","og_locale":"nl_NL","og_type":"article","og_title":"Social Engineering? Wees op uw hoede... - RPBG","og_description":"Deze keer hebben we het graag over &#8216;Social Engineering&#8217; omdat weinig van ons weten wat het is maar velen toch dagelijks ermee in aanraking komen. Binnen de IT-wereld is er sprake van een driehoeksrelatie: hardware, software en de niet-weg-te-denken \u201chumanware\u201d (geen offici\u00eble term hier). De mens wordt in de IT-wereld nog altijd beschouwd als de [&hellip;]","og_url":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/","og_site_name":"RPBG","article_publisher":"https:\/\/www.facebook.com\/RPBG.ICT\/","article_published_time":"2021-03-16T18:22:20+00:00","article_modified_time":"2021-03-16T18:23:06+00:00","og_image":[{"width":1024,"height":723,"url":"https:\/\/rpbg.com\/rpbg\/wp-content\/uploads\/2021\/03\/RPBG_awareness-ad_social-engineering-1024x723-1.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@RPBG","twitter_site":"@RPBG","twitter_misc":{"Geschreven door":"admin","Geschatte leestijd":"2 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/#article","isPartOf":{"@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/"},"author":{"name":"admin","@id":"https:\/\/rpbg.com\/rpbg\/#\/schema\/person\/f59321c131f2c933626703e7fc123d24"},"headline":"Social Engineering? Wees op uw hoede&#8230;","datePublished":"2021-03-16T18:22:20+00:00","dateModified":"2021-03-16T18:23:06+00:00","mainEntityOfPage":{"@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/"},"wordCount":360,"publisher":{"@id":"https:\/\/rpbg.com\/rpbg\/#organization"},"image":{"@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/#primaryimage"},"thumbnailUrl":"https:\/\/rpbg.com\/rpbg\/wp-content\/uploads\/2021\/03\/RPBG_awareness-ad_social-engineering-1024x723-1.png","articleSection":["blog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/","url":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/","name":"Social Engineering? Wees op uw hoede... - RPBG","isPartOf":{"@id":"https:\/\/rpbg.com\/rpbg\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/#primaryimage"},"image":{"@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/#primaryimage"},"thumbnailUrl":"https:\/\/rpbg.com\/rpbg\/wp-content\/uploads\/2021\/03\/RPBG_awareness-ad_social-engineering-1024x723-1.png","datePublished":"2021-03-16T18:22:20+00:00","dateModified":"2021-03-16T18:23:06+00:00","breadcrumb":{"@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/#primaryimage","url":"https:\/\/rpbg.com\/rpbg\/wp-content\/uploads\/2021\/03\/RPBG_awareness-ad_social-engineering-1024x723-1.png","contentUrl":"https:\/\/rpbg.com\/rpbg\/wp-content\/uploads\/2021\/03\/RPBG_awareness-ad_social-engineering-1024x723-1.png","width":1024,"height":723},{"@type":"BreadcrumbList","@id":"https:\/\/rpbg.com\/rpbg\/2021\/03\/16\/social-engineering-wees-op-uw-hoede\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rpbg.com\/rpbg\/"},{"@type":"ListItem","position":2,"name":"Social Engineering? Wees op uw hoede&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/rpbg.com\/rpbg\/#website","url":"https:\/\/rpbg.com\/rpbg\/","name":"RPBG","description":"IT Company","publisher":{"@id":"https:\/\/rpbg.com\/rpbg\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rpbg.com\/rpbg\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/rpbg.com\/rpbg\/#organization","name":"RPBG","url":"https:\/\/rpbg.com\/rpbg\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/rpbg.com\/rpbg\/#\/schema\/logo\/image\/","url":"https:\/\/rpbg.com\/rpbg\/wp-content\/uploads\/2021\/02\/RPBG-logo-blokjes.png","contentUrl":"https:\/\/rpbg.com\/rpbg\/wp-content\/uploads\/2021\/02\/RPBG-logo-blokjes.png","width":216,"height":220,"caption":"RPBG"},"image":{"@id":"https:\/\/rpbg.com\/rpbg\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RPBG.ICT\/","https:\/\/x.com\/RPBG","https:\/\/www.instagram.com\/rpbgict\/?hl=en","https:\/\/sr.linkedin.com\/company\/rosheuvel-partners-business-group-n-v?trk=similar-pages_result-card_full-click"]},{"@type":"Person","@id":"https:\/\/rpbg.com\/rpbg\/#\/schema\/person\/f59321c131f2c933626703e7fc123d24","name":"admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/daebaa3d2bd67ab83ccd98b3e453ec69128e5917ee9425188c385cf72f424929?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/daebaa3d2bd67ab83ccd98b3e453ec69128e5917ee9425188c385cf72f424929?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/daebaa3d2bd67ab83ccd98b3e453ec69128e5917ee9425188c385cf72f424929?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/rpbg.com\/rpbg"],"url":"https:\/\/rpbg.com\/rpbg\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/posts\/2595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/comments?post=2595"}],"version-history":[{"count":1,"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/posts\/2595\/revisions"}],"predecessor-version":[{"id":2597,"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/posts\/2595\/revisions\/2597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/media\/2596"}],"wp:attachment":[{"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/media?parent=2595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/categories?post=2595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rpbg.com\/rpbg\/wp-json\/wp\/v2\/tags?post=2595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}