Course Hero Logo

Social Engineering.pdf - Social Engineering Grand Canyon...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 6 pages.

1Social EngineeringGrand Canyon UniversityCYB-505-O500 Cyber Warfare and ApplicationProfessor Luis PinaNovember 30, 2022
2Table of content:Reflection…………………………………………………………………………3Attacks……………………………………………………………………………4Spear Phishing attack…………………………………………………………...4Phishing attack…………………..………………………………………………5References………………………………………………………………………..6
3ReflectionAs time progresses, humanity will achieve ever-greater technological heights, yet with theseadvancements come both unprecedented achievements and perilous threats. Information onanybody may now be quickly and easily gleaned from social media and other forms of open-source intelligence. With the advent of social media, people's daily activities are now morepublic than at any other time in human history. The location and activity of users are monitoredby several programs daily. Cybersecurity, by its very nature, prioritizes the rapid cultivation ofindividual cybersecurity skills and talent and their deployment to the front lines of the fight.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
N/A
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture