Chat with us, powered by LiveChat Social Engineering - Writeden

According to research, social engineering makes up a majority of successful data breaches across the world. However, this simple attack vector is often forgotten in cybersecurity over more technical approaches. OSINT and other online tools provide a wealth of information about individuals. However, this information can be used in unethical and immoral ways as we have seen in social engineering attacks performed by various malicious actors.

Part 1:

In this assignment, use open-source intelligence tools such as the OSINT framework, Facebook, LinkedIn, Pinterest, and other social media websites to research a family member or friend. Choose and create two attacks from the list below and include examples.

Spear Phishing Attack

Phishing attack

  • Whaling Attack
  • Vishing Attack
  • Smishing Attack
  • Note: Do NOT send the attacks.
  • Provide a screenshot of your intelligence gathering and the creation of the two attacks. Place all screenshots in a Microsoft Word document and submit it to the assignment. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window; this includes the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.

Part 2:

Write a 250- to 500-word reflection discussing the moral and ethical considerations as they relate to cyberstalking from the Christian worldview of human flourishing. What other abusive behaviors can be performed through the tools we have used, and why, as cybersecurity professionals, must we be ever vigilant in our ethical decisions? Examine how the internet is used for cybercrime, cyberstalking, predators, cyberbullying, and other abusive behaviors. Include at least one biblical reference in your response.