Explain how social engineering can promote cybersecurity intrusion.

Explanation should include

  • shoulder surfing
  • backdoor trojans
  • masquerading
  • dumpster diving
  • familiarity exploit
  • phishing

Explanation should also include

  • the need for email and browser protections
  • the importance of controlling network ports and hardware/software assets.

Process/Skill Questions:

  • What is social engineering?
  • What are ways to protect an organization against phishing attacks on employees?
  • How does phishing trick people into giving away data?
  • Why are personalized user credentials and permissions essential in preventing cyberattacks?
  • Why is it dangerous to open attachments in emails from senders not known by the company or representative?
  • How do piggybacking and tailgating depend on human decency and/or common manners (e.g., holding a door open for someone carrying a large package) to circumvent restricted access controlled by electronic devices?