Type: Individual ProjectUnit: Security Threats and Attacks
6-8 PowerPoint slides
Hackers use not only computerized methods to steal your data but also social methods to prey on your emotions to obtain confidential data, log-ins, passwords, or entrance to secure facilities. Face-to-face attacks are called social engineering attacks.
Research various social engineering techniques, and pick one to describe.
Include the following:
A description how the technique is delivered
Signs to look for
An example of the attack
How to prevent the attempt
Adhere to APA formatting and reference guidelines when writing your response. Additionally, your response should be free of grammatical errors, use complete sentences, and give specific details to support statements.