The ProcessNow you're ready to start formulating your plans, right? 4. As you go through the resources below group the methods and background information into the three types of "hats" that you see above. Grouping the methods into these different categories will help you when you create your scenario to both attack and defend against social engineering. * You will write the two scenarios using word processing software such as Microsoft Word or Google Drive. * You should then use your Office Live or Google Drive account to share your document. These collaborative software options will allow other to view your scenario and make comments. * Submit the link to your online submission to the professor by email. 5. Don't forget to complete the survey in the top left of this page. |