Using a web browser find the article “Methods for Understanding and Reducing Social Engineering Attacks” on the SANS Institute website. A search engine should easily find the article. The SANS Institute is a cooperative research and education organization that offers information security training and security certification. The SANS Reading Room has many articles that are relevant to the practice of cybersecurity analysis. You can join the SANS community by creating a free user account in order to access to the latest articles, or you can access the older articles without a user account. Read the article or choose another article on social engineering, read it, and answer the following questions: Questions: a. What are the three methods used in social engineering to gain access to information? b. What are three examples of social engineering attacks from the first two methods in step 2a? c. Why is social networking a social engineering threat? d. How can an organization defend itself from social engineering attacks? e. What is the SANS Institute, which authored this article?
Using a web browser find the article “Methods for Understanding and Reducing Social Engineering Attacks”
on the SANS Institute website. A search engine should easily find the article.
The SANS Institute is a cooperative research and education organization that offers
training and security certification. The SANS Reading Room has many articles that are relevant to the
practice of cybersecurity analysis. You can join the SANS community by creating a free user account in order
to access to the latest articles, or you can access the older articles without a user account.
Read the article or choose another article on social engineering, read it, and answer the following questions:
Questions:
a. What are the three methods used in social engineering to gain access to information?
b. What are three examples of social engineering attacks from the first two methods in step 2a?
c. Why is social networking a social engineering threat?
d. How can an organization defend itself from social engineering attacks?
e. What is the SANS Institute, which authored this article?
Trending now
This is a popular solution!
Step by step
Solved in 5 steps