CYB 260 Project Three Milestone Guidelines and Rubric Social Engineering CYB 260 Project Three Milestone Guidelines and Rubric Social Engineering Overview One of the fundamental maxims of...

1 answer below »

CYB 260 Project Three Milestone Guidelines and Ru
ic Social Engineering

















CYB 260 Project Three Milestone Guidelines and Ru
ic
Social Engineering
Overview
One of the fundamental maxims of cybersecurity is that security is everyone’s responsibility. Ultimately, this speaks to the idea that regardless of the physical or
technological protections in place, the weakest link will always be the human factor. In Project Three, one of the requirements you will address relates to the
importance of training for cybersecurity awareness. In a study of over 50,000 incidents, Verizon XXXXXXXXXXreported that 49% of all
eaches involved a human
element. In this activity, you will investigate a particular area of concern—social engineering.
Prompt
After reviewing this module’s reading and resources, address the critical elements listed below.
I. Summarize the significance of social engineering as an area for a security practitioner to have knowledge of.
II. Select one social engineering method from each of the categories in the table below. For each of your chosen methods, provide a
ief description of
how that method could be applied to expose an organization.
Social Engineering Methods
Physical Psychological Technological
Dumpster diving
Shoulder surfing
Piggybacking/tailgating
Baiting
Impersonation
Seduction
Persuasion/coercion
Reverse social engineering
Phishing
Pharming
Spim/smishing
Spit
Vishing
Trojans and viruses
Man-in-the-middle
III. Select one of the case studies from Chapter 8 in Social Engineering: The Art of Human Hacking (linked in the Reading and Resources section of Module
Five). Describe an appropriate method of training employees to reduce the threat of one of the social engineering methods used in your selected case
study. In your response, consider including the issues related to the following questions:
 What are the key warning signs that would indicate to an employee that they are a victim of social engineering?
1












 What are the best practices employees should be aware of concerning the social engineering method?
 What are ways training can help with getting employees to adopt the security mindset necessary to reduce the vulnerability to the social
engineering threat?
Ru
ic
Guidelines for Submission: Your submission should be 2 to 3 pages in length and should use double spacing, 12-point Times New Roman font, and one-inch
margins. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (65%) Not Evident (0%) Value
Significance of
Social Engineering
Meets “Proficient” criteria and
addresses critical element in an
exceptionally clear, insightful,
sophisticated, or creative
manner
Summarizes the significance of
social engineering as an area for
a security practitioner to have
knowledge of
Addresses “Proficient” criteria,
ut there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
i
elevant
18
Application of
Social Engineering
Method: Physical
Meets “Proficient” criteria and
addresses critical element in an
exceptionally clear, insightful,
sophisticated, or creative
manner
Describes how a physical method
of social engineering could be
applied to expose an
organization
Addresses “Proficient” criteria,
ut there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
i
elevant
18
Application of
Social Engineering
Method:
Psychological
Meets “Proficient” criteria and
addresses critical element in an
exceptionally clear, insightful,
sophisticated, or creative
manner
Describes how a psychological
method of social engineering
could be applied to expose an
organization
Addresses “Proficient” criteria,
ut there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
i
elevant
18
Application of
Social Engineering
Method:
Technological
Meets “Proficient” criteria and
addresses critical element in an
exceptionally clear, insightful,
sophisticated, or creative
manner
Describes how a technological
method of social engineering
could be applied to expose an
organization
Addresses “Proficient” criteria,
ut there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
i
elevant
18
Training
Employees
Meets “Proficient” criteria and
addresses critical element in an
exceptionally clear, insightful,
sophisticated, or creative
manner
Describes an appropriate
method of training employees to
educe the threat of one of the
social engineering methods used
in the selected case study
Addresses “Proficient” criteria,
ut there are gaps in clarity,
logic, or detail
Does not address critical
element, or response is
i
elevant
18
2












Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (65%) Not Evident (0%) Value
Articulation of
Response
Submission is free of e
ors
elated to citations, grammar,
spelling, and organization and is
presented in a professional and
easy-to-read format
Submission has no major e
ors
elated to citations, grammar,
spelling, or organization
Submission has some e
ors
elated to citations, grammar,
spelling, or organization that
negatively impact readability and
articulation of main ideas
Submission has critical e
ors
elated to citations, grammar,
spelling, or organization that
prevent understanding of ideas
10
Total 100%
Reference
Verizon XXXXXXXXXXData
each digest: Perspective is reality. Retrieved from http:
www.verizonenterprise.com
esources
eports
p_data-
each-digest-2017-
perspective-is-reality_xg_en.pdf
3
http:
www.verizonenterprise.com
esources
eports
p_data-
each-digest-2017
    CYB 260 Project Three Milestone Guidelines and Ru
ic Social Engineering
    Overview
    Prompt
    Ru
ic
    Reference
Answered 1 days AfterApr 05, 2022

Solution

Amit answered on Apr 07 2022
12 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 4/7/2022
Table of Contents
i.    Significance of social engineering in security area    3
ii.    Social engineering methods and there use for organization expose    3
iii.    Methods to train employees    4
iv.    References:    6
i. Significance of social engineering in security area
The term which is developed for defining the human interaction by conducting a
oad range of different activities is known as social engineering. The psychological manipulation is mainly ca
ied out for stealing sensitive information and conducting security attacks with help of different tricks. These tricks includes baiting, scareware, pre-texting, phishing, spear phishing and many other techniques. Thus, it becomes important that security of social engineering must be considered on important bases. For maintaining security, multifactor authentication, updated antivirus, firewalls and spam filters are mainly used by social engineering based networks. The email based attacks are mainly ca
ied out on social engineering platforms.
ii. Social engineering methods and there use for organization expose
The social engineering method and use of those methods to expose any organization are described below:
1. Tailgating/ piggybacking: It is a type of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here