Explain how social engineering can promote cybersecurity intrusion.
Explanation should include
- shoulder surfing
- backdoor trojans
- masquerading
- dumpster diving
- familiarity exploit
- phishing
Explanation should also include
- the need for email and browser protections
- the importance of controlling network ports and hardware/software assets.
Process/Skill Questions:
- What is social engineering?
- What are ways to protect an organization against phishing attacks on employees?
- How does phishing trick people into giving away data?
- Why are personalized user credentials and permissions essential in preventing cyberattacks?
- Why is it dangerous to open attachments in emails from senders not known by the company or representative?
- How do piggybacking and tailgating depend on human decency and/or common manners (e.g., holding a door open for someone carrying a large package) to circumvent restricted access controlled by electronic devices?