{"id":6777,"date":"2020-10-12T16:46:46","date_gmt":"2020-10-12T20:46:46","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/?p=6777"},"modified":"2020-10-12T16:46:46","modified_gmt":"2020-10-12T20:46:46","slug":"wk-7-reading-discussion","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/2020\/10\/12\/wk-7-reading-discussion\/","title":{"rendered":"Wk #7: Reading Discussion"},"content":{"rendered":"<p><strong>Social Engineering:<\/strong><\/p>\n<ul>\n<li>Human behavior of social engineering(attack vs. attacker): Financial gain, self-interest,\u00a0<strong>Revenge, <\/strong>external pressures\n<ul>\n<li>Reverse social engineering: enticed to ask the aggressor for help(through tricking them), aggressor offers help just to make sure the victim remains unsuspicious while the attacker probes more<\/li>\n<\/ul>\n<\/li>\n<li>Counter-measures: creating controls (training\/policies\/security\/management\/&#8230;)\n<ul>\n<li>Perform regular reviews that the controls are working as created.<\/li>\n<li>Simulate an attack(hire pen testing specialists)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Question for the class:<\/p>\n<ol>\n<li>Have you ever been a victim to social engineering?<\/li>\n<li>What&#8217;s one physical control that can be used to mitigate chances of a social engineering attack?<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social Engineering: Human behavior of social engineering(attack vs. attacker): Financial gain, self-interest,\u00a0Revenge, external pressures Reverse social engineering: enticed to ask the aggressor for help(through tricking them), aggressor offers help just to make sure the victim remains unsuspicious while the attacker probes more Counter-measures: creating controls (training\/policies\/security\/management\/&#8230;) Perform regular reviews that the controls are working as [&hellip;]<\/p>\n","protected":false},"author":14985,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6777","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/users\/14985"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/comments?post=6777"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6777\/revisions"}],"predecessor-version":[{"id":6778,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6777\/revisions\/6778"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/media?parent=6777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/categories?post=6777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/tags?post=6777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}