Read this explanation on social engineering from We Live Security to understand its prevalence in the world today before

By unice10

Read this explanation on social engineering from WeLiveSecurity to understand its prevalence in the world today before proceeding

Read this explanation on social engineering from We Live Security to understand its prevalence in the world today before proceeding to Project Submission Steps: Social engineering plays an important part in a significant number of cyberattacks, however big, small, or sophisticated the crime is. In fact, as ESET(a Slovak internet security company) ’s senior researcher David Harley has previously observed, it has “been a constant all through the life of internet security.” But what is it exactly? In its broadest sense, social engineering is about psychological manipulation – getting people to do things you want them to do. For example, you could socially engineer a parking warden to avoid a parking fine or play up your employer’s ego for a salary raise. In the context of cybercrime, social engineering is widely described as being a non-technical tactic used by hackers to gather information, conduct fraud or gain illegitimate access to victim computers. Social engineering relies on human interaction and involves tricking people into breaking the security procedures that they would usually follow. (5 things you need to know about social engineering. WeLiveSecurity. (2015, December 24). https://www.welivesecurity.com/2015/12/30/5-things-need-know-social-engineering/.) Project Submission Steps Look at the prompts below and follow the provided instructions. 1. Is Kevin Mitnik that smart or are people letting him take them for a ride? Watch the documentary and provide an academic level of commentary. The documentary can be viewed here: 
 2. Answer the following question: Why is persuasion in marketing is okay, but in social engineering it’s not? Listen to the podcast below (`30 min). https://thecyberwire.com/podcasts/hacking-humans/16/notes, and use real-world examples of social engineering and marketing persuasions. 3. Open Source Intelligence (OSINT). Review the OSINT framework (https://osintframework.com/). Use the framework and Maltego to profile a target – yourself: https://www.paterva.com/downloads.php#tab-2 (or pick an OSINT tool of your choice: https://github.com/v2-dev/awesome-social-engineering). See what you can find about yourself and that can be used for a potential social engineering campaign against you. Report the findings (redacted, of course; just the sites and general description of what info is available). Write a hypothetical pretexting scenario. 4. Look around for the latest phishing trends. Use GoPhish, an open-source phishing toolkit, to create and test the campaign with your own email (or set up a dummy email account): https://getgophish.com. Report the steps, cues, and methods you used to create your campaign. Include screenshots from the GoPhish dashboard documenting the successful execution of the test phishing campaign. 5. Write a hypothetical post-phishing exploitation scenario

If you need any assignment help, click this link

Place Order