It is access to the unauthorized system has access to it, or get information by deception or snooping on the network or to spy on the production line, impersonate or disable the system or network.
Types of social engineering attacks:
This is the unauthorized listening to of communication between two people to be able to get some information help the hacker to attack your account.
For Example: the hacker makes a conversation with the victim to get the information to attack the computer in the future.
Looking through the trash for sensitive information. The hacker can often find passwords, file names, or other.
For Example: the hacker uses your computer to get some password to be able to attack your computer in the future.