How attackers use social engineering to bypass your defenses
Source #1 – This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engineering curricular.
Part 5: http://www.youtube.com/watch?v=9xFngEeTpAc&feature=related
Source #2 2>1: Teaming Up for Social Engineering Adventures – This segment is a webcast and presents the current work of social engineering guru Jen Fox.
If you were developing ethical training for a small business (50 employees), list 4 lessons you learned in the material above (each one must be from a different video segment – I have listed a total of 6 segments) that you feel would be imperative to include in enabling your employees to defend your company from social engineering attacks. Your employees all understand why social engineering is a security issue for the company. But a couple of them take you aside and ask why you are including social engineering in the company’s ethical training. Explain how the 4 lessons you learned are relevant to your company’s ethical training.
Do you need high quality Custom Essay Writing Services?