This document discusses social engineering techniques used to manipulate people into revealing sensitive information or performing actions. It defines social engineering as manipulating people to get them to do what you want. Common techniques include pretending to need help, building trust, and creating a sense of urgency. The document also outlines various human-based and computer-based social engineering methods, such as impersonation, phishing emails, and using popup windows. It notes that the best defenses include shredding documents, security policies and procedures, user awareness training, and keeping systems updated.