Computer Science Homework Help

New York Institute of Technology Pretexting Method Discussion

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

Part #1

You are research and find an article or recent news regarding an attack being carried out due to a successful pretexting on the part of the attacker (when I say attacker I mean the social engineer who carried out the task). Make sure to include such things as…

  • A brief summary of the article or recent news
  • How was the attacker able to successfully infiltrate the location or gain access?
  • What was the goal of the attacker?
  • What steps is the person or business taking to prevent this from happening again in the future?

Part #2

Now you are to do your own pretexting exercise simulation gaining access to an otherwise secure location. This is purely for educational purposes only and you are not actually to carry out the attack. It is up to you on what you want to do (where you want to access, the purpose, etc.) but you need to include the following.

  • What is the name of the location you are looking to infiltrate?
  • What is your goal for the infiltration?
  • How do you plan on gaining information and building a OSINT on this location, people there, etc.?
  • Detail your approach going through all six of the principles we discussed in class and this chapter outlining how you would carry out your goal(s)