Discuss social engineering attacks based on the provided techniques. Identify an
ID: 3563829 • Letter: D
Question
Discuss social engineering attacks based on the provided techniques. Identify and discuss appropriate security awareness training that will offset the identified attacks. Discuss why social engineering attacks are particularly difficult to prevent.Begin the assignment by describing why the techniques on the handout are successful and identify types of attacks that use those techniques. Continue by discussing the following: What social engineering attacks are you familiar with based on prior work experience? Have you found any type of training particularly effective or ineffective?
Explanation / Answer
Social engineering methods are limited only by the creativity of the person or persons perpetrating them. Most social engineering takes place via email, text message and phone. However, tactics can include simply walking in the front door behind someone possessing a valid badge, or dropping portable USB drives in the parking lot and waiting for an unsuspecting employee to plug them into their work computer.
Whatever form social engineering takes, businesses and organizations are largely unprepared for how to effectively counter these attempts across their workforces. Getting employees
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.