Lab

profilebkiugi

Assignment Instructions

Lab# 6 Using Social Engineering Techniques to Plan an Attack

Learning Objectives

Upon completing this lab, you will be able to:

  1. Recognize some of the key characteristics of a social engineering attack. 
  2. Identify some of the key signs of a reverse social engineering attack. 
  3. Describe the differences and similarities of an attack of convenience and a targeted attack. 
  4. Implement countermeasures to social and reverse social engineering attacks. 

Tools and Software

The following software and/or utilities are required to complete this lab. Students are encouraged to explore the Internet to learn more about the products and tools used in this lab.

  • None 

Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file including screen captures of the following steps: Part 1, Steps 7, 12, 15, 18, and 22; 
  2. Lab Assessments file; 
  3. Optional: Challenge Questions answers and a sample open source intelligence plan if assigned by your instructor. 

Evaluation Criteria and Rubrics

The following are the evaluation criteria for this lab that students must perform:

  1. Recognize some of the key characteristics of a social engineering attack. .- [20%]
  2. Identify some of the key signs of a reverse social engineering attack. .- [20%] 
  3. Describe the differences and similarities of an attack of convenience and a targeted attack. .- [10%]
  4. Implement countermeasures to social and reverse social engineering attacks.- [50%] 

______________________________________________________________________________________________________________________________________________________________________

Submission Instructions:

Submit screenshots and assessment questions in a single file within the Dropbox with the following naming convention: "ISSC421_Lab#6_Assessment_FirstName_LastName.

Supporting Materials

    • 9 years ago
    • 5
    Answer(2)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      social_engineering_attacks.doc

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      social_engineering_attacks.doc
    Bids(0)