Social Engineering Techniques

Social Engineering Lab Overview: In doing this assignment, you will gain a better understanding of information system vulnerability to social engineering. Summary of tasks: Select a person close to you Perform Social Engineering Techniques to gather information about this person Submit your results and reflection. Your Task You will be gathering enough information to be able to impersonate some person in a social engineering exploit: Name Office number, office phone number Department, Department Manager Something personal like a meeting they attend this week, something that gives someone the sense that you are the person you are impersonating Etc. You can use any open source”telephone books, dumpsters, waste baskets, online information. You will produce a 3 “ 5 page report and turn in your source material. Your report will document what you have done and describe your proposed exploit. You will follow the life cycle of social engineering and you will document your tools and methods. Reflection What are your thoughts about your results? Does this cause you any concern? What do you feel you should do to improve your online presence? Include this in your lab document. For a custom paper on the above topic, place your order now! What We Offer: ¢ On-time delivery guarantee ¢ PhD-level writers ¢ Automatic plagiarism check ¢ 100% money-back guarantee ¢ 100% Privacy and Confidentiality ¢ High Quality custom-written papers