Article Writing Homework Help
How attackers use social engineering to bypass your defenses Source #1 – This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engi
How attackers use social engineering to bypass your defenses
Source #1 – This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engineering curricular.
Part 1: http://www.youtube.com/watch?v=jo08QUujIEA&feature=related
Part 2: http://www.youtube.com/watch?v=w4mU6bS3XzQ&feature=related
Part 3: http://www.youtube.com/watch?v=sJPa2JxenvY&feature=related
Part 4: http://www.youtube.com/watch?v=SxlM2a5Oxio&feature=related
Part 5: http://www.youtube.com/watch?v=9xFngEeTpAc&feature=related
Source #2 2>1: Teaming Up for Social Engineering Adventures – This segment is a webcast and presents the current work of social engineering guru Jen Fox.
https://www.sans.org/webcasts/2-1-teaming-social-engineering-adventures-106850
Work:
If you were developing ethical training for a small business (50 employees), list 4 lessons you learned in the material above (each one must be from a different video segment – I have listed a total of 6 segments) that you feel would be imperative to include in enabling your employees to defend your company from social engineering attacks. Your employees all understand why social engineering is a security issue for the company. But a couple of them take you aside and ask why you are including social engineering in the company’s ethical training. Explain how the 4 lessons you learned are relevant to your company’s ethical training.
No plagiarism.