Assignment: Social Engineering Techniques
Too good to be true, urgency, playing on emotion, offer for help without asking--these are all ways that try to pull the victim in...
Prompt
Humans are naturally trusting (perhaps gullible), which makes us especially vulnerable to a technique called "social engineering." Carefully worded emails and pop-ups can trick us into sharing information we should not otherwise be distributing. Consider the following:
o What are some common methods of social engineering?
o What recent high-profile security incidents involved social engineering?
o Have you or anyone you known fallen prey to social engineering?
o What are some high-profile incidents of social engineering leading to data disclosures?
o What strategies should you take as an enterprise architect to address this? How would you handle disclosure of a security incident?
Format your assignment according to the following formatting requirements:
o The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.
o The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.
o Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.