Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

-Develop a social engineering attack strategy of your professor. NOTE: This is N

ID: 3753142 • Letter: #

Question

-Develop a social engineering attack strategy of your professor. NOTE: This is NOT a real attack - there will be no implementation :) Describe what you believe would be an effective strategy against your professor to elicit confidential/ protected information? Why do you think this approach would succeed?

-Reverse the target - consider yourself and the information footprint you leave behind. Conduct a search on yourself and what information publicly exists out there about you that can be used to profile you and get you to divulge sensitive information. In an abstract way, describe what you found out? Were you surprised by how much/ how little you found? What could you do to better protect your information?

-Identify and describe an attack strategy used by hackers. How can it be mitigated? If possible, bring in an example of when this attack strategy was successful and how the organization responded.

-Explore the US-CERT page or choose a software vendor and explore how they report vulnerabilities. How can you integrate this source into your vulnerability and threat awareness strategy?

Explanation / Answer

These kinds of attacks are becoming very common for all people these days varying from small companies to individuals .

social engineering attack strategy of professor:

This can be done by sending proffessor malicious links , empotions like fear should be attached to that like :
Hi (name of proffessor)your this shameful activity was recorded by student ..click to open .

this link when clicked will automatically attck on proffesors whole system / their whole data will be in hands of attacker .attacker might use infecticious link ,phishing .

so in fear of getting exposed he will surely click on that . in curosity to see what is inside.

search on yourself :

About me as a student if some one offer me "upcoming exam papers leaked by proffesor by mistake on internet"

these kinds of malicious link will tempt me to click and become prey / victim of hacker

How attackers gets to know all this:

About your interest hackers find it by using your private information which you have provided on internet on social networking websites

Attack strategy used by hackers: basically they attack by manipulating psychologically or fooling unsuspected users or employees and becuse of that confidential or sensitive data of comapny / individual is in hands of these hackers .
other attacks can be like sending Ransomware .that is a type of malware that encrypts your files .
links like : court notice , as you open attachments you are caught by hackers .

and that can be misused to a greater extent .

vulnerability reports and awareness can come / can be done when we start feeling some different annoying things / activities on our system like