Y10-05-P27: Social Engineering
Y10-05-P27: Social Engineering
Learning objectives
For more information and additional learner activities see Topic 5.3 of
the student book.
© Pearson Education Ltd 2020. Copying permitted for purchasing institution only.
Y10-05-P27: Social engineering
Social engineering
© Pearson Education Ltd 2020. Copying permitted for purchasing institution only.
Y10-05-P27: Social engineering
© Pearson Education Ltd 2020. Copying permitted for purchasing institution only.
Y10-05-P27: Social engineering
© Pearson Education Ltd 2020. Copying permitted for purchasing institution only.
Y10-05-P27: Social engineering
For each of these situations, describe the potential risks of the action
and come up with a rule for an AUP that would prevent the action.
• A user has uploaded an MP3 file downloaded from the internet
to a shared drive.
• A user receives a suspicious email which tells them their
online shopping account has been compromised. They click
the link provided to reset their password.
• An employee finds a USB memory stick in the car park and
decides to plug it into their computer to see who it belongs to.
• An employee uses a social media account on their company
laptop.
© Pearson Education Ltd 2020. Copying permitted for purchasing institution only.
Y10-05-P27: Social engineering
© Pearson Education Ltd 2020. Copying permitted for purchasing institution only.