Critical Thinking (Two Topics)

User Generated

Zhngu2000

Computer Science

Description

------Topic 1: Social Engineering and IT Security Incident Response

As additional background, read the following two articles:

http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411

https://www.ijcsi.org/papers/IJCSI-13-6-129-135.pdf

In a written analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi company. Discuss what methods and weaknesses you would use to exploit the employees or family members of employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation.

Your paper should be 1-2 pages in length, not including the title and references pages, and should cite at least two scholarly from journals or research resource other than the course materials. It should follow academic writing standards and APA style guidelines, as appropriate.

------Topic 2: Defending IT Systems

As preparation, read the following:

https://joshua14.homelinux.org/blog/?p=1392

In a written analysis of the above commands and processes, discuss how you might defeat the firewall of a school or organization and describe how you would accomplish this from both inside and outside of the organization. Include any recommendations to the school or organization to improve its defense. Why is this knowledge important to the ethical hacker?

Your paper should be 1-2 pages in length, not including the title and references pages, and should cite at least two scholarly from journals or research resource other than the course materials. It should follow academic writing standards and APA style guidelines, as appropriate.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: SOCIAL ENGINEERING

Social Engineering and IT Security
Student’s Name
Institutional Affiliation

1

SOCIAL ENGINEERING

2
Social Engineering and IT Security

The basis of launching an attack to any information system is to extract the valuable
information that would be used for various functions. For instance, this data could be used to
expose operations of an organization to ruin it regarding its reputation thus hindering its
competitiveness in the market. This tactic is usually used by competing institutions which try any
means possible to outdo the other one.
All this is possible based on social engineering to get any useful information through
several ways. Through consistent interaction with some people from your target institution, an
individual can lure the victim to expose the information sought by an attacker (Oriyano, 2013).
In most cases, the women are prone to giving in quickly especially if the attacker is a male
counterpart and eventually they would not have realized when they leaked the data to the
...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags