SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Lab 3: Explore Social Engineering Techniques
Introduction
Cybersecurity is critical because it involves protecting unauthorized access to sensitive data,
personally identifiable information (PII), protected health information (PHI), personal
information, intellectual property (IP), and sensitive systems. Social engineering is a broad range
of malicious activities accomplished by psychologically manipulating people into performing
actions or divulging confidential information. In this lab, you will explore social engineering
techniques, sometimes called human hacking, which is a broad category for different types of
attacks.
Required Resources
PC or mobile device with internet access
Background / Scenario
Recent research reveals the most common types of cyberattacks are becoming more
sophisticated, and the attack targets are growing. The purpose of an attack is to steal information,
disable systems or critical services, disrupt systems, activities, and operations. Some attacks are
designed to destroy information or information systems, maliciously control a computing
environment or its infrastructure, or destroy the integrity of data and/or information systems. One
of the most effective ways an attacker can gain access to an organizations network is through
simple deception. In the cybersecurity world this is called social engineering.
Instructions
Step 1: Explore Baiting, Shoulder Surfing, and Pretexting.
The National Support Center for Systems Security and Information Assurance (CSSIA) hosts a
Social Engineering Interactive activity. The current link to the site is
https://www.cssia.org/social_engineering/ . However, if the link changes, try searching for
"CSSIA Social Engineering Interactive".
Click Next in the interactive activity, and then use the content to answer the following questions.
Questions:
What is baiting? What happened to the victims system after you clicked on the USB drive? (/1)
What is Shoulder Surfing? What device was used to perform the shoulder surfing? What
information was gained? (/2)
What is Pretexting? What type of information did the cybercriminal request? Would you fall
victim? (/2)
Step 2: Explore Phishing/Spear Phishing and Whaling
Phishing is designed to get victims to click on links to malicious websites, open attachments that
contain malware, or reveal sensitive information. Use the interactive activity to explore different
phishing techniques.
In this phishing example, what is the ploy the attacker uses to trick the victim to visit the trap
website? What is the trap website used to do? (/2)
What is the difference between phishing and spear phishing or whaling? (/1)
Step 3: Explore Scareware and Ransomware
Scareware is when victims are deceived into thinking that their system is infected with malware
and receive false alarms prompting them to install software that is not needed or is itself
malware. Ransomware is a type of malware that threatens to publish the victim's data or encrypts
the victims data preventing access or the ability to use the data. Victims are prevented from
accessing their system or personal files until they make a ransom payment to regain access.
What data does the attacker claim to have in this example? Would you fall for this deception?
(/2)
What is the attacker requesting the victim do to get the data back? (/1)
What is tailgating (/1)
Give three ways to prevent social engineering attacks? (/3)

Weitere ähnliche Inhalte

Ähnlich wie Explore Social Engineering Techniques Lab

An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskDr. Lasantha Ranwala
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscapecyberprosocial
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxyoufanlimboo
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT WorldAkshay Mittal
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Cybersecurity
CybersecurityCybersecurity
CybersecuritySabiha M
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloJohn Intindolo
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a reviewINFOGAIN PUBLICATION
 

Ähnlich wie Explore Social Engineering Techniques Lab (20)

An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer security
Computer securityComputer security
Computer security
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT World
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Mobile security
Mobile securityMobile security
Mobile security
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a review
 

Mehr von lalitaggarwal627

Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdfLas acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdflalitaggarwal627
 
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdfLas asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdflalitaggarwal627
 
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdfLa siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdflalitaggarwal627
 
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdfLa riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdflalitaggarwal627
 
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdfLa prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdflalitaggarwal627
 
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdfLa NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdflalitaggarwal627
 
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdfLa mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdflalitaggarwal627
 
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdfLa l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdflalitaggarwal627
 
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdfLa NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdflalitaggarwal627
 
La herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdfLa herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdflalitaggarwal627
 
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdfLa estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdflalitaggarwal627
 
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdfLa deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdflalitaggarwal627
 
l need help with matching and definitions. Thank you! Matching De.pdf
l need help with matching and definitions. Thank you!  Matching De.pdfl need help with matching and definitions. Thank you!  Matching De.pdf
l need help with matching and definitions. Thank you! Matching De.pdflalitaggarwal627
 
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you!  Dental Terminology 7. Which tooth is the .pdfl need help. Thank you!  Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdflalitaggarwal627
 
l need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdfl need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdflalitaggarwal627
 
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdfK�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdflalitaggarwal627
 
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdfKonu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdflalitaggarwal627
 
Joanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdfJoanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdflalitaggarwal627
 
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdfJim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdflalitaggarwal627
 
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdfKanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdflalitaggarwal627
 

Mehr von lalitaggarwal627 (20)

Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdfLas acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
 
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdfLas asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
 
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdfLa siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
 
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdfLa riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
 
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdfLa prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
 
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdfLa NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
 
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdfLa mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
 
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdfLa l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
 
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdfLa NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
 
La herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdfLa herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdf
 
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdfLa estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
 
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdfLa deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
 
l need help with matching and definitions. Thank you! Matching De.pdf
l need help with matching and definitions. Thank you!  Matching De.pdfl need help with matching and definitions. Thank you!  Matching De.pdf
l need help with matching and definitions. Thank you! Matching De.pdf
 
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you!  Dental Terminology 7. Which tooth is the .pdfl need help. Thank you!  Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
 
l need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdfl need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdf
 
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdfK�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
 
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdfKonu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
 
Joanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdfJoanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdf
 
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdfJim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
 
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdfKanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
 

Kürzlich hochgeladen

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 

Kürzlich hochgeladen (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 

Explore Social Engineering Techniques Lab

  • 1. Lab 3: Explore Social Engineering Techniques Introduction Cybersecurity is critical because it involves protecting unauthorized access to sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property (IP), and sensitive systems. Social engineering is a broad range of malicious activities accomplished by psychologically manipulating people into performing actions or divulging confidential information. In this lab, you will explore social engineering techniques, sometimes called human hacking, which is a broad category for different types of attacks. Required Resources PC or mobile device with internet access Background / Scenario Recent research reveals the most common types of cyberattacks are becoming more sophisticated, and the attack targets are growing. The purpose of an attack is to steal information, disable systems or critical services, disrupt systems, activities, and operations. Some attacks are designed to destroy information or information systems, maliciously control a computing environment or its infrastructure, or destroy the integrity of data and/or information systems. One of the most effective ways an attacker can gain access to an organizations network is through simple deception. In the cybersecurity world this is called social engineering. Instructions Step 1: Explore Baiting, Shoulder Surfing, and Pretexting. The National Support Center for Systems Security and Information Assurance (CSSIA) hosts a Social Engineering Interactive activity. The current link to the site is https://www.cssia.org/social_engineering/ . However, if the link changes, try searching for "CSSIA Social Engineering Interactive". Click Next in the interactive activity, and then use the content to answer the following questions. Questions: What is baiting? What happened to the victims system after you clicked on the USB drive? (/1) What is Shoulder Surfing? What device was used to perform the shoulder surfing? What information was gained? (/2) What is Pretexting? What type of information did the cybercriminal request? Would you fall victim? (/2) Step 2: Explore Phishing/Spear Phishing and Whaling Phishing is designed to get victims to click on links to malicious websites, open attachments that
  • 2. contain malware, or reveal sensitive information. Use the interactive activity to explore different phishing techniques. In this phishing example, what is the ploy the attacker uses to trick the victim to visit the trap website? What is the trap website used to do? (/2) What is the difference between phishing and spear phishing or whaling? (/1) Step 3: Explore Scareware and Ransomware Scareware is when victims are deceived into thinking that their system is infected with malware and receive false alarms prompting them to install software that is not needed or is itself malware. Ransomware is a type of malware that threatens to publish the victim's data or encrypts the victims data preventing access or the ability to use the data. Victims are prevented from accessing their system or personal files until they make a ransom payment to regain access. What data does the attacker claim to have in this example? Would you fall for this deception? (/2) What is the attacker requesting the victim do to get the data back? (/1) What is tailgating (/1) Give three ways to prevent social engineering attacks? (/3)