Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

How attackers use social engineering to bypass your defenses Source #1 - This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engi

How attackers use social engineering to bypass your defenses

Source #1 - This is a SANS session presented in five segments. This is older material, but is considered bedrock information in social engineering curricular.  

Part 1: http://www.youtube.com/watch?v=jo08QUujIEA&feature=related

Part 2: http://www.youtube.com/watch?v=w4mU6bS3XzQ&feature=related

Part 3: http://www.youtube.com/watch?v=sJPa2JxenvY&feature=related

Part 4: http://www.youtube.com/watch?v=SxlM2a5Oxio&feature=related

Part 5: http://www.youtube.com/watch?v=9xFngEeTpAc&feature=related

Source #2  2>1: Teaming Up for Social Engineering Adventures  -  This segment is a webcast and presents the current work of social engineering guru Jen Fox.

https://www.sans.org/webcasts/2-1-teaming-social-engineering-adventures-106850

Work:

If you were developing ethical training for a small business (50 employees), list 4 lessons you learned in the material above (each one must be from a different video segment - I have listed a total of 6 segments) that you feel would be imperative to include in enabling your employees to defend your company from social engineering attacks. Your employees all understand why social engineering is a security issue for the company. But a couple of them take you aside and ask why you are including social engineering in the company's ethical training.  Explain how the 4 lessons you learned are relevant to your company's ethical training.

No plagiarism.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question