14

.docx

School

Augusta Technical College *

*We aren’t endorsed by this school

Course

2452

Subject

Electrical Engineering

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by CorporalExplorationGoat38 on coursehero.com

Lab - Social Engineering Objectives Research and identify social engineering attacks Background / Scenario Social engineering is an attack with the goal of getting a victim to enter personal or sensitive information, this type of attack can be performed by an attacker utilizing a keylogger, phishing email, or an in-person method. This lab requires the research of social engineering and the identification of ways to recognize and prevent it. Required Resources PC or mobile device with internet access Instructions Using a web browser find the article “Methods for Understanding and Reducing Social Engineering Attacks” on the SANS Institute website. A search engine should easily find the article. The SANS Institute is a cooperative research and education organization that offers information security training and security certification. The SANS Reading Room has many articles that are relevant to the practice of cybersecurity analysis. You can join the SANS community by creating a free user account in order to access to the latest articles, or you can access the older articles without a user account. Read the article or choose another article on social engineering, read it, and answer the following questions: Questions: a. What are the three methods used in social engineering to gain access to information? Type Electronic access, physical access, and social media are all used this way. b. What are three examples of social engineering attacks from the first two methods in step 2a? Phishing, Tailgating, and Baiting. Another would be pretexting and quid pro quo. c. Why is social networking a social engineering threat? Because it can expose people to dangers via introductions on a wide scale to strangers online. This can run the risk of malicious investigation. By providing easier access to your data online, it can make you an easier mark for potential exploiters and other criminals. It is best to limit who has access to your online information, even if only seemingly innocent info.
© 2017 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com Lab - Social Engineering d. How can an organization defend itself from social engineering attacks? One way is to implement training meant to mitigate thr isk of this. Teaching employees to always take certain precautions or to only act within certain limits for example. e. What is the SANS Institute, which authored this article? Typetype here © 2017 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help