Sign In
Not register? Register Now!
Pages:
1 page/β‰ˆ275 words
Sources:
Check Instructions
Style:
APA
Subject:
Business & Marketing
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.18
Topic:

Information Security Management: Social Engineering Attack

Coursework Instructions:

Information Security Management Course Work
Please read "Today's Attacks and Defenses" doc first, linked in the attachment.
Case Project 2-3: Your Social Engineering Attack
Today’s Attacks and Defenses at the beginning of this chapter illustrated how a security researcher could manipulate a help desk support technician into compromising security.
1. If you were to create your own social engineering attack, what would it be? Using your place of employment or school, first determine exactly what your goal would be in the attack, and then craft a detailed description of how you would carry out the attack using only social engineering to achieve your goal. You might want to search the Internet for examples of previously successful attacks that used social engineering.
2. Why do you think your attack would be successful?
3. Who would be involved?
4. What would be the problems in achieving your goal?
5. Why?
Write a one-page paper on your research.
Do your own work and make sure you answer all the questions.
It will submit on the Turnitin.
Submission will be sent to Turnitin to be electronically reviewed for plagiarism.

Coursework Sample Content Preview:

Information Security Management
Author’s Name
The Institutional Affiliation
Course Number and Name
Instructor Name
Assignment Due Date
Information Security Management
Social Engineering Attack
I believe that I can create a social engineering phishing attack to gain access to the confidential data present in my place of work. My goal will be to gain access to confidential data and then to use it as the blackmail chip. I will send an email to the help desk support informing that there has been a policy violation committed in our organization. I will include a malicious link of the genuine website, which will be identical to a legitimate website (Haggag, 2017). After clicking on the link, the user will be asked to enter personal credentials with a password. It will provide me with access to the help desk supports the system, and I will be able to access the information of all the customers.
The attack will be successful because help desk support personnel working in our organization do not possess the necessary IT knowledge. Moreover, all the employees trust me as I have been working in the company as an intern, and the employer knows me personally (Gupta et al., 2016). The help desk staff will be deceived to click on the link quickly, and I will be able to gain access to their system.
I will create a social engineering attack with the help of my friend, who is...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Coursework Samples: