• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 7 Readings: Social Engineering

October 12, 2020 by Anthony Messina 1 Comment

This paper goes over the process of social engineering. Social engineers are essentially actors that try to exfiltrate data or gain entry to a building by deceiving people. There are 4 phases in a social engineering attack, Information gathering, developing relationships, execution, and exploitation. Once the proper intel is gathered on a target, the attacker can assume a myriad of roles to achieve his/her goal. The attacker can pretend to be an important user such as a senior manager or a helpless user that requires assistance to gain access to the organizations systems. The most popular attack seems to be embedding an email with malicious code that can trigger a virus or a remote shell to the victims computer.

 

Questions for the class:

What are some preventative measures used in combating Social Engineering?

Filed Under: Week 07: Social Engineering Tagged With:

Reader Interactions

Comments

  1. Mei X Wang says

    October 12, 2020 at 4:49 pm

    Hi Anthony, a great way to combat social engineering is by offering new employee training on the concepts and how to spot out an attack. Also performing yearly reviews and even trying to simulate an attack internally to see how alert employees are will be extremely helpful in combatting social engineering.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in