Baral_Nirnaya_Project#1

docx

School

Webster University *

*We aren’t endorsed by this school

Course

5250

Subject

Sociology

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by DeanTurtlePerson4160

Report
Nirnaya Baral Week 6: Project #1 CSSS- 5180: Social Engineering John Sprague Due Date: 20 th Feb 2023
Based on the 2016 US presidential election case studies and ISIS, the social networking ‘Triad of Disruption’ framework can be used to develop a strategic campaign. Social Media Increase social media presence : The campaign should increase its presence on social media platforms by creating profiles and pages on popular social networks, such as Facebook, Twitter, Instagram, and YouTube, among others. Use social media to connect with voters : The campaign should use social media to communicate with potential voters by sharing information about the candidate, their policies, and the campaign's vision. The movement should also encourage supporters to share their views and experiences on social media platforms to generate engagement and encourage sharing. Monitor social media conversations : The campaign should monitor social media conversations to identify any negative sentiment or misinformation and respond promptly to address concerns or correct false information. Propaganda Create persuasive messaging : The campaign should create compelling messaging that resonates with potential voters, highlighting the candidate's strengths and policies and addressing concerns or issues important to voters. Discredit misinformation : The campaign should identify and discredit any misinformation spread by opposing campaigns or social media and provide factual evidence to support the campaign's messaging. Utilize social proof : The campaign should use social proof to build trust and credibility by featuring endorsements from influential people or sharing positive reviews from supporters. Reliance on Unverifiable Online News Sources Monitor online news sources : The campaign should monitor online news sources to identify unverifiable or false news stories that could damage the campaign's reputation. Fact-check news stories : The campaign should fact-check news stories before sharing or responding to them to ensure that they are accurate and truthful.
Encourage mainstream media coverage : The campaign should work to secure mainstream media coverage to provide more credible sources of information and limit the reliance on unverifiable online news sources. The Social Networking ‘Triad of Disruption’ framework can be used to develop a comprehensive campaign plan. By focusing on social media, propaganda, and the reliance on unverifiable online news sources, the campaign can create a solid social media presence, effectively communicate its messaging, and limit the impact of misinformation on the campaign's reputation. I will present a hypothetical plan focusing on cybersecurity, which can use the Triad of Destruction to protect a company or government organization from potential threats: Strategy : This plan aims to protect a company or government organization from cyber threats using the Triad of Destruction as a guiding principle. The plan seeks to identify potential targets that threaten the organization and implement appropriate measures to neutralize them using Social Engineering (SE) techniques. Targets Phishing emails : The plan targets phishing emails, which pose a significant threat to the organization. Phishing emails use social engineering techniques to trick employees into giving away confidential information or downloading malware. Weak passwords : Weak passwords are an easy target for hackers looking to gain unauthorized access to the organization's systems. Outdated software : Outdated software is vulnerable to cyber-attacks and malware that can compromise the security of the organization's systems. Method of Targeting Phishing emails : The plan will use spear phishing to target employees most likely to fall prey to phishing emails. Spear phishing involves sending personalized emails to specific individuals who are likely to have sensitive information that hackers want to access.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Weak passwords : The plan will target weak passwords using social engineering techniques like password spraying and brute force attacks. Outdated software : The plan will target outdated software using vulnerability scanning and penetration testing. Timeline The plan will be implemented over a six-month timeline with the following activities: Month 1-2 : Conduct a vulnerability assessment to identify vulnerabilities in the organization's systems. Month 2-3 : Implement technical measures like patch management, endpoint protection, and two-factor authentication. Month 3-4 : Conduct penetration testing to test the effectiveness of the implemented measures. Month 4-5 : Launch a spear-phishing campaign to target employees likely to fall prey to phishing emails. Month 5-6 : Conduct regular security awareness training for employees to educate them about the dangers of cyber threats and how to avoid them.
References Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on US Relations with the Islamic World. https://www.brookings.edu/wp-content/uploads/2016/06/isis_twitter_census_berger_morgan.pdf Neumann, P. R. (2013). Countering Online Radicalization in America. Testimony before the United States Senate Committee on Homeland Security and Governmental Affairs. https://www.hsgac.senate.gov/imo/media/doc/Neumann_Testimony.pdf Pariser, E. (2011). The Filter Bubble: What the Internet is Hiding From You. Penguin. Sunstein, C. R. (2017). #Republic: Divided Democracy in the Age of Social Media. Princeton University Press. Watts, C. (2018). Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News. HarperCollins. Woolley, S. C., & Howard, P. N. (2016). Computational Propaganda: Political Parties, Politicians, and Political Manipulation on Social Media. Oxford University Press. https://global.oup.com/academic/product/computational-propaganda-9780190931407? cc=us&lang=en&