|
|
College students enrolled in the Security Basics course should complete this
Social engineering task in lesson two. You've had an opportunity to learn the basic threats and risks that can face an information system. For the lesson two task we will focus on the objective "Explain social engineering attacks AND Create and defend against social engineering in a task" Successful completion of this Social engineering task will require you to complete the two parts of the assessment below and earn at least 300 total points using the rubric provided. |
|
|
The Task
In 200-250 words create a realistic scenario of how you could use social engineering to gain access to a higher education institution's information system. Give at least four different methods.
In 50-100 words describe at least three methods that an information security professional could use to prevent the described attack.
In 50-100 words describe at least three methods that an information security professional could use to prevent the described attack.
- For both portions of the task be sure to use the resources provided on the next page.
- Be sure that you support your ideas with recommended resources or other sources that you find.
- You should use creativity in designing your scenario, but also keep the scenario realistic and directly related to social engineering attacks.
- In part 2, provide solutions to at least three of the four possible exploits that you describe in part 1.
- Spelling, grammer, and professional writing are also important.