Article Writing Homework Help

How attackers use social engineering to bypass your defenses Source #1 – This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engi

How attackers use social engineering to bypass your defenses

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

Source #1 – This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engineering curricular.  

Part 1: http://www.youtube.com/watch?v=jo08QUujIEA&feature=related

Part 2: http://www.youtube.com/watch?v=w4mU6bS3XzQ&feature=related

Part 3: http://www.youtube.com/watch?v=sJPa2JxenvY&feature=related

Part 4: http://www.youtube.com/watch?v=SxlM2a5Oxio&feature=related

Part 5: http://www.youtube.com/watch?v=9xFngEeTpAc&feature=related

Source #2  2>1: Teaming Up for Social Engineering Adventures  –  This segment is a webcast and presents the current work of social engineering guru Jen Fox.

https://www.sans.org/webcasts/2-1-teaming-social-engineering-adventures-106850

Work:

If you were developing ethical training for a small business (50 employees), list 4 lessons you learned in the material above (each one must be from a different video segment – I have listed a total of 6 segments) that you feel would be imperative to include in enabling your employees to defend your company from social engineering attacks. Your employees all understand why social engineering is a security issue for the company. But a couple of them take you aside and ask why you are including social engineering in the company’s ethical training.  Explain how the 4 lessons you learned are relevant to your company’s ethical training.

No plagiarism.