Describe at least two possible social engineering types of attacks that may threaten your work environment
SOCIAL ENGINEERING
Social engineering is one of the biggest threats to cyber security. It exploits the vulnerabilities in human behavior to gain access or retrieve information. Social engineering is the manipulation of humans to obtain unauthorized access to information or information systems.
Technical security measures do not help in countering social engineering. No matter how much an organization invests in security tools, products, and professionals, if the human factor is compromised, then all other security measures are useless. A different set of tools, training, procedures, and policies are required to protect from social engineering cyber-threats.
For this Discussion, you examine the possible social engineering threats to your organization and advise on proactive plans to reduce the possibility of such attacks.
RESOURCES
Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
WEEKLY RESOURCES
To prepare for this Discussion:
• Review this week’s Learning Resources and videos on cybercrime prevention methods.
• Seek other external resources on the topic.
BY DAY 4
Post with an initial post of 300–400 words in which you:
• Briefly describe your work environment or another one with which you are familiar.
• Describe at least two possible social engineering types of attacks that may threaten your work environment.
• Analyze the potential damage of these attacks if they occurred.
• Analyze the possible causes of these attacks and recommend a plan for avoiding their occurrence.
• Use external credible and scholarly resources to support your post.
Refer to the Week 7 Discussion 2 Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.
Read a selection of your colleagues’ postings.
BY DAY 7
Respond to at least two of your colleagues in one or more of the following ways:
• Make substantial follow-up posts. A substantial post:
o Sufficiently responds to comments from the Instructor and other students who reviewed and commented on your work
o Presents a critical review of other students’ work and additional information/synthesis that adds to or increases the discussion
o Contributes a personal experience/example that applies to the content
o Explores new aspects of the Discussion question, possibly using additional external sources, but remains focused on the topic
• Provide sensitive and insightful feedback in a constructive manner.
• Encourage further dialogue and discussion through open-ended questions.
Return to this Discussion to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.
Be sure to use APA formatting throughout and support your work with specific citations from this week’s Learning Resources and any additional sources.
LEARNING RESOURCES
Required Readings
• Turban, E., Pollard, C., & Wood, G. (2021). Information technology for management: Driving digital transformation to enhance local and global performance, growth and sustainability (12th ed.). Wiley.
o Chapter 5, “Data Privacy and Cyber Security” (pp. 149–198)
• Greengard, S. (2016). Cybersecurity gets smartLinks to an external site.. Communications of the ACM, 59(5), 29–31. https://doi.org/10.1145/2898969
• Shein, E. (2015). Companies proactively seek out internal threatsLinks to an external site.. Communications of the ACM, 58(11), 15¬–17. https://doi.org/10.1145/2820423
Required Media
• Walden University, LLC. (2017). Introduction to cybercrime [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 4 minutes.
• Walden University, LLC. (2017). Cybercrime case studies [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 10 minutes.
• Walden University, LLC. (2017). Protection against cybercrime [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 6 minutes.
• Walden University, LLC. (2017). Incorporating cyber security in an it security risk management environment [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 7 minutes.
• Barlow, C. (2016, November). Where is cybercrime really coming from?Links to an external site. [Video]. TED. https://www.ted.com/talks/caleb_barlow_where_is_cybercrime_really_coming_from
Note: The approximate length of this media piece is 14 minutes.
Optional Resources
• FBI Internet Crime Complaint Center (IC3)Links to an external site.. (n.d.). https://www.ic3.gov
• Get Safe OnlineLinks to an external site.. (2019). https://www.getsafeonline.org/
• HM Government. (n.d.). Cyber awareLinks to an external site.. https://www.cyberaware.gov.uk/
• Larson, S. (2017). Massive cyberattack targeting 99 countries causes sweeping havocLinks to an external site.. CNN Business. http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/index.html
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
