The attack 101 The conclusion 101 Social engineering countermeasures 101 Training 101 Frameworks and protocols 101 Categorizing information 101 Protocols 101 Tests 101 Resistance to social engineering 102 Waste handling 102 General advice 102 Software protection 103 Intelligence and research used for social engineering 103 Sources 103 Search engines 103 Google Alerts 105 Google/Bing images 105 Using web archives 105 Social media 106 Specialized search engines 106 Media –文档,照片,视频106电话号码和地址107在线跟踪IP地址和存在107结论107参考文献107