SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Lab 3: Explore Social Engineering Techniques
Introduction
Cybersecurity is critical because it involves protecting unauthorized access to sensitive data,
personally identifiable information (PII), protected health information (PHI), personal
information, intellectual property (IP), and sensitive systems. Social engineering is a broad range
of malicious activities accomplished by psychologically manipulating people into performing
actions or divulging confidential information. In this lab, you will explore social engineering
techniques, sometimes called human hacking, which is a broad category for different types of
attacks.
Required Resources
PC or mobile device with internet access
Background / Scenario
Recent research reveals the most common types of cyberattacks are becoming more
sophisticated, and the attack targets are growing. The purpose of an attack is to steal information,
disable systems or critical services, disrupt systems, activities, and operations. Some attacks are
designed to destroy information or information systems, maliciously control a computing
environment or its infrastructure, or destroy the integrity of data and/or information systems. One
of the most effective ways an attacker can gain access to an organizations network is through
simple deception. In the cybersecurity world this is called social engineering.
Instructions
Step 1: Explore Baiting, Shoulder Surfing, and Pretexting.
The National Support Center for Systems Security and Information Assurance (CSSIA) hosts a
Social Engineering Interactive activity. The current link to the site is
https://www.cssia.org/social_engineering/ . However, if the link changes, try searching for
"CSSIA Social Engineering Interactive".
Click Next in the interactive activity, and then use the content to answer the following questions.
Questions:
What is baiting? What happened to the victims system after you clicked on the USB drive? (/1)
What is Shoulder Surfing? What device was used to perform the shoulder surfing? What
information was gained? (/2)
What is Pretexting? What type of information did the cybercriminal request? Would you fall
victim? (/2)
Step 2: Explore Phishing/Spear Phishing and Whaling
Phishing is designed to get victims to click on links to malicious websites, open attachments that
contain malware, or reveal sensitive information. Use the interactive activity to explore different
phishing techniques.
In this phishing example, what is the ploy the attacker uses to trick the victim to visit the trap
website? What is the trap website used to do? (/2)
What is the difference between phishing and spear phishing or whaling? (/1)
Step 3: Explore Scareware and Ransomware
Scareware is when victims are deceived into thinking that their system is infected with malware
and receive false alarms prompting them to install software that is not needed or is itself
malware. Ransomware is a type of malware that threatens to publish the victim's data or encrypts
the victims data preventing access or the ability to use the data. Victims are prevented from
accessing their system or personal files until they make a ransom payment to regain access.
What data does the attacker claim to have in this example? Would you fall for this deception?
(/2)
What is the attacker requesting the victim do to get the data back? (/1)
What is tailgating (/1)
Give three ways to prevent social engineering attacks? (/3)

Contenu connexe

Similaire à Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf

Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
John Intindolo
 

Similaire à Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf (20)

An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
Health information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and riskHealth information security 3 vulnerability threat and risk
Health information security 3 vulnerability threat and risk
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer security
Computer securityComputer security
Computer security
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT World
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Mobile security
Mobile securityMobile security
Mobile security
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a review
 

Plus de lalitaggarwal627

Las asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdfLas asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
lalitaggarwal627
 
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdfLa NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
lalitaggarwal627
 
l need help with matching and definitions. Thank you! Matching De.pdf
l need help with matching and definitions. Thank you!  Matching De.pdfl need help with matching and definitions. Thank you!  Matching De.pdf
l need help with matching and definitions. Thank you! Matching De.pdf
lalitaggarwal627
 
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you!  Dental Terminology 7. Which tooth is the .pdfl need help. Thank you!  Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
lalitaggarwal627
 
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdfKonu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
lalitaggarwal627
 

Plus de lalitaggarwal627 (20)

Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdfLas acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
Las acciones de Credit Suisse Group cotizan en la Bolsa de Valores d.pdf
 
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdfLas asignaciones de casos deben completarse con un estudio escrito d.pdf
Las asignaciones de casos deben completarse con un estudio escrito d.pdf
 
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdfLa siguiente informaci�n proviene de los estados financieros de Anti.pdf
La siguiente informaci�n proviene de los estados financieros de Anti.pdf
 
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdfLa riqueza de una econom�a es generada por activos reales. La dispon.pdf
La riqueza de una econom�a es generada por activos reales. La dispon.pdf
 
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdfLa prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
La prima _____________ es la porci�n de una tasa de inter�s nominal .pdf
 
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdfLa NASA es una organizaci�n gubernamental independiente de los depar.pdf
La NASA es una organizaci�n gubernamental independiente de los depar.pdf
 
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdfLa mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
La mayor�a de las personas, sin darse cuenta, compran muchos product.pdf
 
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdfLa l�nea del mercado de capitales seleccione todas las que correspo.pdf
La l�nea del mercado de capitales seleccione todas las que correspo.pdf
 
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdfLa NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
La NIA 701, Comunicaci�n de las cuestiones clave de la auditor�a en .pdf
 
La herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdfLa herencia del color del pelaje en los labradores retrievers es un .pdf
La herencia del color del pelaje en los labradores retrievers es un .pdf
 
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdfLa estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
La estrella Achernar tiene un paralaje de Hipparchus de .02339 arque.pdf
 
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdfLa deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
La deuda a largo plazo a pagar con fondos propios se reporta como un.pdf
 
l need help with matching and definitions. Thank you! Matching De.pdf
l need help with matching and definitions. Thank you!  Matching De.pdfl need help with matching and definitions. Thank you!  Matching De.pdf
l need help with matching and definitions. Thank you! Matching De.pdf
 
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you!  Dental Terminology 7. Which tooth is the .pdfl need help. Thank you!  Dental Terminology 7. Which tooth is the .pdf
l need help. Thank you! Dental Terminology 7. Which tooth is the .pdf
 
l need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdfl need explanation why the answer I choose is wrong and why the othe.pdf
l need explanation why the answer I choose is wrong and why the othe.pdf
 
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdfK�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
K�lt�rler aras y�netim alanndaki bir�ok aratrmac, disiplinleri sosya.pdf
 
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdfKonu  Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
Konu Politikalar ve Stratejileri Bir firmann stratejisi u iki so.pdf
 
Joanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdfJoanne is the sole owner of a successful business that exports food .pdf
Joanne is the sole owner of a successful business that exports food .pdf
 
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdfJim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
Jim, Endonezyada Ormanszlamaya Kar Eylem kampanyasnn proje y�neti.pdf
 
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdfKanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
Kanadada Nesli T�kenmekte Olan Yaban Hayatnn Stat�s� Komitesi COSEW.pdf
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Lab 3 Explore Social Engineering TechniquesIntroductionCybers.pdf

  • 1. Lab 3: Explore Social Engineering Techniques Introduction Cybersecurity is critical because it involves protecting unauthorized access to sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property (IP), and sensitive systems. Social engineering is a broad range of malicious activities accomplished by psychologically manipulating people into performing actions or divulging confidential information. In this lab, you will explore social engineering techniques, sometimes called human hacking, which is a broad category for different types of attacks. Required Resources PC or mobile device with internet access Background / Scenario Recent research reveals the most common types of cyberattacks are becoming more sophisticated, and the attack targets are growing. The purpose of an attack is to steal information, disable systems or critical services, disrupt systems, activities, and operations. Some attacks are designed to destroy information or information systems, maliciously control a computing environment or its infrastructure, or destroy the integrity of data and/or information systems. One of the most effective ways an attacker can gain access to an organizations network is through simple deception. In the cybersecurity world this is called social engineering. Instructions Step 1: Explore Baiting, Shoulder Surfing, and Pretexting. The National Support Center for Systems Security and Information Assurance (CSSIA) hosts a Social Engineering Interactive activity. The current link to the site is https://www.cssia.org/social_engineering/ . However, if the link changes, try searching for "CSSIA Social Engineering Interactive". Click Next in the interactive activity, and then use the content to answer the following questions. Questions: What is baiting? What happened to the victims system after you clicked on the USB drive? (/1) What is Shoulder Surfing? What device was used to perform the shoulder surfing? What information was gained? (/2) What is Pretexting? What type of information did the cybercriminal request? Would you fall victim? (/2) Step 2: Explore Phishing/Spear Phishing and Whaling Phishing is designed to get victims to click on links to malicious websites, open attachments that
  • 2. contain malware, or reveal sensitive information. Use the interactive activity to explore different phishing techniques. In this phishing example, what is the ploy the attacker uses to trick the victim to visit the trap website? What is the trap website used to do? (/2) What is the difference between phishing and spear phishing or whaling? (/1) Step 3: Explore Scareware and Ransomware Scareware is when victims are deceived into thinking that their system is infected with malware and receive false alarms prompting them to install software that is not needed or is itself malware. Ransomware is a type of malware that threatens to publish the victim's data or encrypts the victims data preventing access or the ability to use the data. Victims are prevented from accessing their system or personal files until they make a ransom payment to regain access. What data does the attacker claim to have in this example? Would you fall for this deception? (/2) What is the attacker requesting the victim do to get the data back? (/1) What is tailgating (/1) Give three ways to prevent social engineering attacks? (/3)