What is Social Engineering? Provide and explain the seven types
of Social Engineering. Given a real-life example of each type of
Social Engineering along with mitigation methods.
Describe what a social engineering attack is.
[Social engineering
is the art of manipulating people so they give up confidential
information. The attackers solicits information such as passwords
or PIN numbers from victims.]
Provide 3 examples of social
engineering attacks and describe how they could be used to
undermine the security of your IT infrastructure.
[ your answer goes here
]
How can social engineering attacks be
defended against? Provide 5 examples with descriptions.
[ your answer goes here
]
In a comprehensive fashion, present the various components of
the National Social Security Program. Explain the extent of its
coverage and its membership. Explain how it is financed, how it
pays benefits to its members. Dscuss its solvency. Provide your
recommendations for long-term sustainability.
After reading the article "Don't Include Social Engineering in
Penetration Tests," discuss whether social engineering should be
included as part of a penetration test. Knowing that the human is
the weakest link in the cybersecurity chain, is it ethical as part
of the pen test to engage in behavior that the author describes as
a "grey area: compromising staff members' personal devices or
personal email accounts (as opposed to work accounts); breaking
into office buildings to steal equipment or plant...