Posted: September 7th, 2015

Social Engineering Techniques

Social Engineering Lab
Overview:

In doing this assignment, you will gain a better understanding of information system vulnerability to social engineering.
Summary of tasks:

Select a person close to you
Perform Social Engineering Techniques to gather information about this person
Submit your results and reflection.

Your Task

You will be gathering enough information to be able to impersonate some person in a social engineering exploit:

Name
Office number, office phone number
Department, Department Manager
Something personal like a meeting they attend this week, something that gives someone the sense that you are the person you are impersonating
Etc.

You can use any open source—telephone books, dumpsters, waste baskets, online information. You will produce a 3 – 5 page report and turn in your source material. Your report will document what you have done and describe your proposed exploit. You will follow the life cycle of social engineering and you will document your tools and methods.
Reflection

What are your thoughts about your results? Does this cause you any concern? What do you feel you should do to improve your online presence? Include this in your lab document.

For a custom paper on the above topic, place your order now!

What We Offer:

• On-time delivery guarantee

• PhD-level writers

• Automatic plagiarism check

• 100% money-back guarantee

• 100% Privacy and Confidentiality

• High Quality custom-written papers

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Live Chat+1-631-333-0101EmailWhatsApp