14

.docx

School

Valencia College *

*We aren’t endorsed by this school

Course

ETHICS IN

Subject

Electrical Engineering

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by ElderGoosePerson1010 on coursehero.com

Lab - Social Engineering Part %2: Objectives Research and identify social engineering attacks Part 1 – SANS Understanding & Reducing Social Engineering Attacks Part 2 – Social Engineering Framework Part 3 – Social Engineering Video and Questions Part %2: Background / Scenario Social engineering is an attack with the goal of getting a victim to enter personal or sensitive information, this type of attack can be performed by an attacker utilizing a keylogger, phishing email, or an in-person method. This lab requires the research of social engineering and the identification of ways to recognize and prevent it. Part %2: Required Resources PC or mobile device with internet access Part %2: Instructions Step %3: SANS – Methods for Understanding & Reducing Social Engineering Attacks Using a web browser read the article “Methods for Understanding and Reducing Social Engineering Attacks” on the SANS Institute website. The whitepaper can be downloaded here: https://www.sans.org/reading- room/whitepapers/critical/methods-understanding-reducing-social-engineering-attacks-36972 The SANS Institute is a cooperative research and education organization that offers information security training and security certification. The SANS Reading Room has many articles that are relevant to the practice of cybersecurity analysis. You can join the SANS community by creating a free user account in order to access to the latest articles, or you can access the older articles without a user account. Read the article or choose another article on social engineering, read it, and answer the following questions: Questions: a. What are the three methods used in social engineering to gain access to information? Type your answers here. b. What are three examples of social engineering attacks from the first two methods in step 2a? Type your answers here. 2017 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 3 www.netacad.com
Lab - Social Engineering c. Why is social networking a social engineering threat? Type your answers here. d. How can an organization defend itself from social engineering attacks? Type your answers here. e. What is the SANS Institute, which authored this article? e here. Step %3: Social Engineer Framework (50%) Step 1: Visit the Social Engineer website: https://www.social-engineer.org/framework/general- discussion ) a. What is Chris’ motto related to the ethics of Social Engineering? b. What are the three phases of communication and how does it relate to networking? c. What is the law of expectations, and does it involve presupposition? d. What is an influence tactic? Please list one of the eight aspects and a brief description about it e. How can you protect yourself against Phishing & Vishing? f. What is the social engineering tool developed by David Kennedy? g. Bonus: Where can we install the SET? 2017 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 3 www.netacad.com
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help