0% found this document useful (0 votes)
177 views2 pages

2.4.8 Lab - Social Engineering

This document describes a lab on social engineering attacks. The objectives are to research and identify social engineering attacks. Some common social engineering methods discussed are phishing, pretexting, and dumpster diving. The lab instructions have the student read a specific article on social engineering from the SANS Institute website and answer questions about social engineering methods, examples of attacks, why social networking is a threat, and how organizations can defend against social engineering. The SANS Institute is described as a leading cybersecurity training and research organization.

Uploaded by

duongreal355
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
177 views2 pages

2.4.8 Lab - Social Engineering

This document describes a lab on social engineering attacks. The objectives are to research and identify social engineering attacks. Some common social engineering methods discussed are phishing, pretexting, and dumpster diving. The lab instructions have the student read a specific article on social engineering from the SANS Institute website and answer questions about social engineering methods, examples of attacks, why social networking is a threat, and how organizations can defend against social engineering. The SANS Institute is described as a leading cybersecurity training and research organization.

Uploaded by

duongreal355
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Name : NGOB DUONG

Lab - Social Engineering


Objectives
Research and identify social engineering attacks

Background / Scenario
Social engineering is an attack with the goal of getting a victim to enter personal or sensitive information, this
type of attack can be performed by an attacker utilizing a keylogger, phishing email, or an in-person method.
This lab requires the research of social engineering and the identification of ways to recognize and prevent it.

Required Resources
 PC or mobile device with internet access

Instructions
Using a web browser find the article “Methods for Understanding and Reducing Social Engineering Attacks”
on the SANS Institute website. A search engine should easily find the article.
The SANS Institute is a cooperative research and education organization that offers information security
training and security certification. The SANS Reading Room has many articles that are relevant to the
practice of cybersecurity analysis. You can join the SANS community by creating a free user account to
access to the latest articles, or you can access the older articles without a user account.
Read the article or choose another article on social engineering, read it, and answer the following questions:
Questions:

What are the three methods used in social engineering to gain access to information?
Phishing, Pretexting, Dumpster Diving.
What are three examples of social engineering attacks from the first two methods in the previous question?
Phishing:
- attacker send a fake website Link such as Facebook, telegram or back account so when we inter
username and password the attack can capture username and password so they can log in to our
account
Spear phishing attack :
- Attacker pretend to be someone with trust source such as colleague send an email link which when
we click it will install malware or provide attacker access to sensitive data.
Pretexting Attack:
- An attacker poses as a representative from a company's IT department and calls an employee,
claiming that there is an urgent issue with their computer. The attacker convinces the employee to
provide their login credentials, claiming that they need to log in remotely to fix the problem. Once the
attacker has the credentials, they can access the company's network and steal sensitive data or
install malware.

Why is social networking a social engineering threat?

 2017 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com
Lab - Social Engineering

Social networking is a social engineering threat because it provides attackers with a wealth of personal
information about individuals that can be used to craft highly targeted and convincing social engineering
attacks. answers here.
How can an organization defend itself from social engineering attacks?
1. Employee training and awareness: One of the most effective defenses against social
engineering attacks is to educate employees about the techniques used by attackers and
how to recognize and respond to suspicious requests.
2. Strong authentication: Organizations should implement strong authentication mechanisms
such as two-factor authentication (2FA) to reduce the risk of unauthorized access to systems
and data.
3. Access controls: Organizations should implement access controls to limit the amount of
sensitive information that individual employees can access.
4. Incident response planning: Organizations should develop and maintain an incident response
plan that outlines how to respond to social engineering attacks and other security incidents.
5. Technical controls: Organizations should implement technical controls such as anti-virus
software, firewalls, and intrusion detection systems to help identify and prevent social
engineering attacks.

What is the SANS Institute, which authored this article?


The SANS Institute is a leading organization in the field of cybersecurity training and research. It was
established in 1989 as a cooperative research and education organization and has since become one of the
most trusted sources of information and training in the cybersecurity industry.e.
End of document

 2017 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com

You might also like