CIS425L_U1_1.2.4.12 Lab.docx

CIS425L_U1_1.2.4.12 Lab.docx - Lab Social Engineering...

This preview shows page 1 - 2 out of 3 pages.

Lab - Social Engineering Objective In this lab, you will research examples of social engineering and identify ways to recognize and prevent it. Resources Computer with Internet Access Step 1: Research Social Engineering Examples Social engineering, as it relates to information security, is used to describe the techniques used by a person (or persons) who manipulate people in order to access or compromise information about an organization or its computer systems. A social engineer is usually difficult to identify and may claim to be a new employee, a repair person, or researcher. The social engineer might even offer credentials to support that identity. By gaining trust and asking questions, he or she may be able to piece together enough information to infiltrate an organization's network. QUESTION 1: Use any Internet browser to research incidents of social engineering. Summarize three examples found in your research. The first example of a social engineering attack that I found occurred in 2013. In this hack the Associated Press had their Twitter account hacked. This was accomplished by using a spearphishing attack that resembled an email from other employees. This email included a ling to a fictions site that prompted users to use their log in credentials. Eventually someone logged in with the same password that matched the Twitter account. After access to the Twitter account was gained, a tweet was posted calming the white house had been bombed, and that the President had been injured. The post was taken down after 3 minutes, but this was enough time for the stock market to drop 150 points, or $136 billion. This drop rebounded to its former level shortly after the truth emerged. My second example of social engineering takes place in 2014 when Sony Pictures prepared to release their movie “The Interview”. North Korea was not happy with this movie making fun of their leader so they threatened retaliation if they release this movie. This retaliation came in the form of a spearphishing email
Image of page 1

Subscribe to view the full document.

Image of page 2
You've reached the end of this preview.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern