Shop

How attackers use social engineering to bypass your defenses

Category:
Description

How attackers use social engineering to bypass your defenses

Source #1 – This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engineering curricular.  

Part 1: http://www.youtube.com/watch?v=jo08QUujIEA&feature=related

Part 2: http://www.youtube.com/watch?v=w4mU6bS3XzQ&feature=related

Part 3: http://www.youtube.com/watch?v=sJPa2JxenvY&feature=related

Part 4: http://www.youtube.com/watch?v=SxlM2a5Oxio&feature=related

Part 5: http://www.youtube.com/watch?v=9xFngEeTpAc&feature=related

Source #2  2>1: Teaming Up for Social Engineering Adventures  –  This segment is a webcast and presents the current work of social engineering guru Jen Fox.

https://www.sans.org/webcasts/2-1-teaming-social-engineering-adventures-106850

Work:

If you were developing ethical training for a small business (50 employees), list 4 lessons you learned in the material above (each one must be from a different video segment – I have listed a total of 6 segments) that you feel would be imperative to include in enabling your employees to defend your company from social engineering attacks. Your employees all understand why social engineering is a security issue for the company. But a couple of them take you aside and ask why you are including social engineering in the company’s ethical training.  Explain how the 4 lessons you learned are relevant to your company’s ethical training.

Do you need high quality Custom Essay Writing Services?

Order now
Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “How attackers use social engineering to bypass your defenses”

Your email address will not be published. Required fields are marked *