SOCIAL ENGINEERING
Social engineering is one of the biggest threats to cyber security. It exploits the vulnerabilities in human behavior to gain access or retrieve information. Social engineering is the manipulation of humans to obtain unauthorized access to information or information systems.
Technical security measures do not help in countering social engineering. No matter how much an organization invests in security tools, products, and professionals, if the human factor is compromised, then all other security measures are useless. A different set of tools, training, procedures, and policies are required to protect from social engineering cyber-threats.
For this Discussion, you examine the possible social engineering threats to your organization and advise on proactive plans to reduce the possibility of such attacks.
RESOURCES

Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
WEEKLY RESOURCES
To prepare for this Discussion:
• Review this week’s Learning Resources and videos on cybercrime prevention methods.
• Seek other external resources on the topic.
BY DAY 4
Post with an initial post of 300–400 words in which you:
• Briefly describe your work environment or another one with which you are familiar.
• Describe at least two possible social engineering types of attacks that may threaten your work environment.
• Analyze the potential damage of these attacks if they occurred.
• Analyze the possible causes of these attacks and recommend a plan for avoiding their occurrence.
• Use external credible and scholarly resources to support your post.
Refer to the Week 7 Discussion 2 Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.
Read a selection of your colleagues’ postings.
BY DAY 7
Respond to at least two of your colleagues in one or more of the following ways:
• Make substantial follow-up posts. A substantial post:
o Sufficiently responds to comments from the Instructor and other students who reviewed and commented on your work
o Presents a critical review of other students’ work and additional information/synthesis that adds to or increases the discussion
o Contributes a personal experience/example that applies to the content
o Explores new aspects of the Discussion question, possibly using additional external sources, but remains focused on the topic
• Provide sensitive and insightful feedback in a constructive manner.
• Encourage further dialogue and discussion through open-ended questions.
Return to this Discussion to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.
Be sure to use APA formatting throughout and support your work with specific citations from this week’s Learning Resources and any additional sources.
LEARNING RESOURCES
Required Readings
• Turban, E., Pollard, C., & Wood, G. (2021). Information technology for management: Driving digital transformation to enhance local and global performance, growth and sustainability (12th ed.). Wiley.
o Chapter 5, “Data Privacy and Cyber Security” (pp. 149–198)
• Greengard, S. (2016). Cybersecurity gets smartLinks to an external site.. Communications of the ACM, 59(5), 29–31. https://doi.org/10.1145/2898969
• Shein, E. (2015). Companies proactively seek out internal threatsLinks to an external site.. Communications of the ACM, 58(11), 15¬–17. https://doi.org/10.1145/2820423
Required Media
• Walden University, LLC. (2017). Introduction to cybercrime [Video]. Walden University Canvas. https://waldenu.instructure.com

Note: The approximate length of this media piece is 4 minutes.

• Walden University, LLC. (2017). Cybercrime case studies [Video]. Walden University Canvas. https://waldenu.instructure.com

Note: The approximate length of this media piece is 10 minutes.

• Walden University, LLC. (2017). Protection against cybercrime [Video]. Walden University Canvas. https://waldenu.instructure.com

Note: The approximate length of this media piece is 6 minutes.

• Walden University, LLC. (2017). Incorporating cyber security in an it security risk management environment [Video]. Walden University Canvas. https://waldenu.instructure.com

Note: The approximate length of this media piece is 7 minutes.

• Barlow, C. (2016, November). Where is cybercrime really coming from?Links to an external site. [Video]. TED. https://www.ted.com/talks/caleb_barlow_where_is_cybercrime_really_coming_from

Note: The approximate length of this media piece is 14 minutes.
Optional Resources
• FBI Internet Crime Complaint Center (IC3)Links to an external site.. (n.d.). https://www.ic3.gov
• Get Safe OnlineLinks to an external site.. (2019). https://www.getsafeonline.org/
• HM Government. (n.d.). Cyber awareLinks to an external site.. https://www.cyberaware.gov.uk/
• Larson, S. (2017). Massive cyberattack targeting 99 countries causes sweeping havocLinks to an external site.. CNN Business. http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/index.html

Would you like to discuss this project or get it done? 

Reach out on WHATSapp at +1 (240) 389-5520

Or 
 Place an order on our website for quick help

Guarantees

A+ Paper
 Timely Delivery
 Zero Plagiarism
 Zero AI


Leave a Reply

Your email address will not be published. Required fields are marked *