SlideShare a Scribd company logo
Lab 3: Explore Social Engineering Techniques
Introduction
Cybersecurity is critical because it involves protecting unauthorized access to sensitive data,
personally identifiable information (PII), protected health information (PHI), personal
information, intellectual property (IP), and sensitive systems. Social engineering is a broad range
of malicious activities accomplished by psychologically manipulating people into performing
actions or divulging confidential information. In this lab, you will explore social engineering
techniques, sometimes called human hacking, which is a broad category for different types of
attacks.
Required Resources
PC or mobile device with internet access
Background / Scenario
Recent research reveals the most common types of cyberattacks are becoming more
sophisticated, and the attack targets are growing. The purpose of an attack is to steal information,
disable systems or critical services, disrupt systems, activities, and operations. Some attacks are
designed to destroy information or information systems, maliciously control a computing
environment or its infrastructure, or destroy the integrity of data and/or information systems. One
of the most effective ways an attacker can gain access to an organizations network is through
simple deception. In the cybersecurity world this is called social engineering.
Instructions
Step 1: Explore Baiting, Shoulder Surfing, and Pretexting.
The National Support Center for Systems Security and Information Assurance (CSSIA) hosts a
Social Engineering Interactive activity. The current link to the site is
https://www.cssia.org/social_engineering/ . However, if the link changes, try searching for
"CSSIA Social Engineering Interactive".
Click Next in the interactive activity, and then use the content to answer the following questions.
Questions:
What is baiting? What happened to the victims system after you clicked on the USB drive? (/1)
What is Shoulder Surfing? What device was used to perform the shoulder surfing? What
information was gained? (/2)
What is Pretexting? What type of information did the cybercriminal request? Would you fall
victim? (/2)
Step 2: Explore Phishing/Spear Phishing and Whaling
Phishing is designed to get victims to click on links to malicious websites, open attachments that
contain malware, or reveal sensitive information. Use the interactive activity to explore different
phishing techniques.
In this phishing example, what is the ploy the attacker uses to trick the victim to visit the trap
website? What is the trap website used to do? (/2)
What is the difference between phishing and spear phishing or whaling? (/1)
Step 3: Explore Scareware and Ransomware
Scareware is when victims are deceived into thinking that their system is infected with malware
and receive false alarms prompting them to install software that is not needed or is itself
malware. Ransomware is a type of malware that threatens to publish the victim's data or encrypts
the victims data preventing access or the ability to use the data. Victims are prevented from
accessing their system or personal files until they make a ransom payment to regain access.
What data does the attacker claim to have in this example? Would you fall for this deception?
(/2)
What is the attacker requesting the victim do to get the data back? (/1)
What is tailgating (/1)
Give three ways to prevent social engineering attacks? (/3)

More Related Content

Similar to Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf

An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
IOSR Journals
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
Dr. Lasantha Ranwala
 
Unveiling the Tactics_ How Hackers Exploit Your Internet Security by Greg Pie...
Unveiling the Tactics_ How Hackers Exploit Your Internet Security by Greg Pie...Unveiling the Tactics_ How Hackers Exploit Your Internet Security by Greg Pie...
Unveiling the Tactics_ How Hackers Exploit Your Internet Security by Greg Pie...
Greg Pierson
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
cyberprosocial
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
cyberprosocial
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi14
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT World
Akshay Mittal
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
ManassahIjudigal
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Sabiha M
 
Mobile security
Mobile securityMobile security
Mobile security
Tapan Khilar
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
John Intindolo
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
shraddhazad
 

Similar to Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf (20)

An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
 
Unveiling the Tactics_ How Hackers Exploit Your Internet Security by Greg Pie...
Unveiling the Tactics_ How Hackers Exploit Your Internet Security by Greg Pie...Unveiling the Tactics_ How Hackers Exploit Your Internet Security by Greg Pie...
Unveiling the Tactics_ How Hackers Exploit Your Internet Security by Greg Pie...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
 
Computer security
Computer securityComputer security
Computer security
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT World
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Mobile security
Mobile securityMobile security
Mobile security
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 

More from lalitaggarwal627

Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdfLas acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
lalitaggarwal627
 
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdfLas asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
lalitaggarwal627
 
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdfLa siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
lalitaggarwal627
 
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdfLa riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
lalitaggarwal627
 
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdfLa prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
lalitaggarwal627
 
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdfLa NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
lalitaggarwal627
 
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdfLa mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
lalitaggarwal627
 
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdfLa l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
lalitaggarwal627
 
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdfLa NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
lalitaggarwal627
 
La herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdfLa herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdf
lalitaggarwal627
 
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdfLa estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
lalitaggarwal627
 
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdfLa deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
lalitaggarwal627
 
l need help with matching and definitions. Thank you! Matching De.pdf
l need help with matching and definitions. Thank you!  Matching De.pdfl need help with matching and definitions. Thank you!  Matching De.pdf
l need help with matching and definitions. Thank you! Matching De.pdf
lalitaggarwal627
 
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you!  Dental Terminology 7. Which tooth is the .pdfl need help. Thank you!  Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
lalitaggarwal627
 
l need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdfl need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdf
lalitaggarwal627
 
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdfK�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
lalitaggarwal627
 
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdfKonu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
lalitaggarwal627
 
Joanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdfJoanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdf
lalitaggarwal627
 
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdfJim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
lalitaggarwal627
 
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdfKanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
lalitaggarwal627
 

More from lalitaggarwal627 (20)

Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdfLas acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
 
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdfLas asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
 
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdfLa siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
 
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdfLa riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
 
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdfLa prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
 
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdfLa NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
 
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdfLa mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
 
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdfLa l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
 
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdfLa NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
 
La herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdfLa herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdf
 
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdfLa estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
 
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdfLa deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
 
l need help with matching and definitions. Thank you! Matching De.pdf
l need help with matching and definitions. Thank you!  Matching De.pdfl need help with matching and definitions. Thank you!  Matching De.pdf
l need help with matching and definitions. Thank you! Matching De.pdf
 
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you!  Dental Terminology 7. Which tooth is the .pdfl need help. Thank you!  Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
 
l need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdfl need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdf
 
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdfK�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
 
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdfKonu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
 
Joanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdfJoanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdf
 
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdfJim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
 
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdfKanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
 

Recently uploaded

Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 

Recently uploaded (20)

Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 

Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf

  • 1. Lab 3: Explore Social Engineering Techniques Introduction Cybersecurity is critical because it involves protecting unauthorized access to sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property (IP), and sensitive systems. Social engineering is a broad range of malicious activities accomplished by psychologically manipulating people into performing actions or divulging confidential information. In this lab, you will explore social engineering techniques, sometimes called human hacking, which is a broad category for different types of attacks. Required Resources PC or mobile device with internet access Background / Scenario Recent research reveals the most common types of cyberattacks are becoming more sophisticated, and the attack targets are growing. The purpose of an attack is to steal information, disable systems or critical services, disrupt systems, activities, and operations. Some attacks are designed to destroy information or information systems, maliciously control a computing environment or its infrastructure, or destroy the integrity of data and/or information systems. One of the most effective ways an attacker can gain access to an organizations network is through simple deception. In the cybersecurity world this is called social engineering. Instructions Step 1: Explore Baiting, Shoulder Surfing, and Pretexting. The National Support Center for Systems Security and Information Assurance (CSSIA) hosts a Social Engineering Interactive activity. The current link to the site is https://www.cssia.org/social_engineering/ . However, if the link changes, try searching for "CSSIA Social Engineering Interactive". Click Next in the interactive activity, and then use the content to answer the following questions. Questions: What is baiting? What happened to the victims system after you clicked on the USB drive? (/1) What is Shoulder Surfing? What device was used to perform the shoulder surfing? What information was gained? (/2) What is Pretexting? What type of information did the cybercriminal request? Would you fall victim? (/2) Step 2: Explore Phishing/Spear Phishing and Whaling Phishing is designed to get victims to click on links to malicious websites, open attachments that
  • 2. contain malware, or reveal sensitive information. Use the interactive activity to explore different phishing techniques. In this phishing example, what is the ploy the attacker uses to trick the victim to visit the trap website? What is the trap website used to do? (/2) What is the difference between phishing and spear phishing or whaling? (/1) Step 3: Explore Scareware and Ransomware Scareware is when victims are deceived into thinking that their system is infected with malware and receive false alarms prompting them to install software that is not needed or is itself malware. Ransomware is a type of malware that threatens to publish the victim's data or encrypts the victims data preventing access or the ability to use the data. Victims are prevented from accessing their system or personal files until they make a ransom payment to regain access. What data does the attacker claim to have in this example? Would you fall for this deception? (/2) What is the attacker requesting the victim do to get the data back? (/1) What is tailgating (/1) Give three ways to prevent social engineering attacks? (/3)