CYB_260 5-2 Project Three Milestone Social Engineering_Richard_BillionChapman

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

260

Subject

Sociology

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by MasterYak1568

Report
5-2 Project Three Milestone: Social Engineering Richard H. Billion-Chapman 11/22/2023
1 I. Summary of Social Engineering: Comprehension of social engineering is crucial for security professionals since it has the potential to exploit the human factor as a fundamental weakness in the security of organizations. The act of manipulating persons, employing methods such as phishing and pretexting, could circumvent even very resilient technical safeguards. The growing complexity of social engineering assaults, along with the possibility of insider threats and the necessity of thorough incident response preparation, highlights its significance within the realm of cybersecurity. Security practitioners have a vital role in the development of educational efforts, the promotion of awareness, and the enforcement of compliance with industry rules. Acknowledging the importance of a comprehensive security approach that encompasses both technical and human- centric elements, professionals’ endeavor to establish robust security frameworks that efficiently tackle the complex difficulties presented by social engineering. II. Social Engineering Methods; Physical, Psychological, Technological One of the selected social engineering techniques is dumpster diving, which is a physical practice that capitalizes on the neglected fragility of abandoned materials. Adversaries engage in the practice of examining an organization's discarded materials to discover confidential information, such as physical documents or electronic devices, thereby gaining valuable knowledge about the organization's data management and disposal practices. The emerging psychological aspect of social engineering includes the concept of impersonation, whereby an individual assumes the identity of a trusted person to deceive others. This strategy could be utilized to obtain unlawful entry by assuming the identity of an employee, IT staff member, or
2 contractor, exploiting trust and power to extract confidential information. Phishing emerges as a prevalent issue within the domain of technology strategies employed for social engineering. The act of deceiving individuals through fraudulent emails or messages, leading them to disclose sensitive information, underscores the significance of cybersecurity education, awareness, and technical safeguards such as email filtering and multi-factor authentication as countermeasures against these misleading online strategies. III. Case Study: Training Employees To effectively reduce the threat of impersonation-based social engineering, employee training should focus on cultivating a security-conscious mindset through a multifaceted approach. Key warning signs, such as unexpected urgency, unusual requests for information, and inconsistencies in communication, should be emphasized. Best practices include implementing verification protocols, raising awareness about data classification, and encouraging a culture of reporting suspicious activity. Simulated social engineering exercises and interactive training modules play a crucial role in providing practical experience and comprehensive understanding. Creating a culture of skepticism, where employees question unexpected requests and prioritize security, is essential. Additionally, the establishment of reward systems for reporting potential threats reinforces positive behavior. By combining these elements, organizations can empower employees to recognize and respond effectively to the risks associated with impersonation-based social engineering, contributing to a more resilient security posture.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3 References: Hadnagy, C. (n.d.). Social Engineering: The Art of Human Hacking . O’Reilly Online Learning. https://learning.oreilly.com/library/view/social-engineering-the/9780470639535/9780470639535 _hadnagy_case_study_2_colon_the_theme_par.html