CYB 350- Cyber Security Management Homework 4
Information Security Officers are in high demand. Using online job-hunting sites (such as Linkedin com, Dice.com, and TheLadders.com) research three open positions in three different U.S. firms (one each). Do NOT copy and paste from the website. Is there a common...
CYB 350- Topic 8 Discussion 1: Chapter 9 in Social Engineering
Chapter 9 in Social Engineering: The Art of Human Hacking talks about how to learn from social engineering audits and apply that knowledge to elevate the overall security posture. In what ways can a security audit help inform strategy and mobilize resources to resolve...
CYB 350- Topic 8 Discussion 2: Class Reflection
What have you learned in this class that can help protect you from social engineering attempts in your own personal/work life? Topic 8 Discussion 2: Class Reflection This class was educational, informative as well and interesting for me. I have learned in detail the...
CYB 350- Topic 7 Discussion 2: Chapter 8 of Social Engineering
Based on the case studies in Chapter 8 of Social Engineering: The Art of Human Hacking, what level of importance would you assign to user awareness training campaigns? Explain your rationale. Topic 7 Discussion 2: Chapter 8 of Social Engineering "User awareness...
CYB 350- Topic 6 Discussion 2: Chapter 7 of Social Engineering
Topic 6 DQ 2 Chapter 7 of Social Engineering: The Art of Human Hacking talks about physical security assessment tools (e.g., lock picks, shims, bump keys, etc.) and use cases for how these tools may be an integral part of a social engineering assessment/attack. What...
CYB 350- Topic 5 Discussion 1: Five Fundamentals of Influence and Persuasion
Review the Five Fundamental of Influence and Persuasion, in Chapter 6 of Social Engineering: The Art of Human Hacking. Where in your daily activities have you seen these principles in use recently? Topic 5 Discussion 1: Five Fundamentals of Influence and...
CYB 350- Topic 4 Discussion 1: Social Engineering
Review the section on building rapport from Chapter 5 in Social Engineering: The Art of Human Hacking, In what ways would the information collected using the recon techniques you have learned help with building rapport as part of a social engineering assessment? Topic...
CYB 350- Topic 1 DQ2: Social Engineering
Topic 1DQ2 In the opening chapter of Social Engineering: The Art of Human Hacking, author Christopher Hadnagy describes the different scenarios/types of social engineering. Which type of social engineering do you expect to most frequently encounter during your career...