Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
3 Sources
Style:
MLA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Phishing Campaigns are One of Many Types of Social Engineering Attacks

Essay Instructions:

Infrastructure Security Awareness Paper. Use federal and industry-standard resources such as NIST, SANS,
PMBoK, and SAMM to create a security awareness paper that teaches the system administrator population
about a specific cybersecurity-related problem such as record retention issues, PCI equipment issues, problems
with transitioning to cloud-based resources, or cybercrime incidents such as malware, ransomware, and
phishing campaigns. Pick one specific threat or attack type and provide a specific sys admin-level awareness
training activity on that specific threat or attack. What does a system administrator need to know about it to
defend against it? Include relevant examples, in-text citations, and provide references at the end of the paper.
This paper should be at least two pages long and no more than four pages long (excluding references).

Essay Sample Content Preview:
Phishing Campaigns are One of Many Types of Social Engineering Attacks
Phishing campaigns are one of many types of social engineering attacks. Social engineering attacks are more rampant today than at any other time in human history. Evidence shows that these attacks grow by more than double yearly (Basit et al., 143). One of the most common types of phishing attacks is email spoofing. In this kind of attack, the perpetrator sends an email to a target aiming to perform a cybercrime. Email spoofing may involve sending out tons of emails, hoping that some people will fall prey to clicking the attachments of the email, or even believing the deceitful message sent and perfume an action based on it. Spoofing may also involve targeted individuals such as the chief executive officer of a company.
Since email spoofing is a very common threat, there are several things that system administrators need to know in order to defend against it. First, the system administrator must be aware of the technology used in spoofing and how exactly spoofing works. With this information, the system administrators will be able to streamline their systems so that they are less prone to phishing attacks (Hu, Peng and Gang, 21). Secondly, the system administrators need to have a comprehensive understanding of how the email system of their organizations works. With this knowledge, they can arrange important educational sessions for employees. According to SANS (2022), education and training are key to helping deal with cyber security threats. Thirdly, the system administrators should have a basic understanding of networking. At the end of the day, any email spoofer must be able to send an email over a network. Through an understanding of networking, the administrators can be more alert to information being exchanged through the network ports of the company and potentially intercept any undesirable spoofing emails.
System administrators should also know that the primary intention of email spoofing is gaining an economic advantage. Most cyber criminals who carry out spoofing aim to defraud targets of some money (Basit et al., 140). With this knowledge...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to social networking:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!