Professional Documents
Culture Documents
Lab - Social Engineering: (Instructor Version)
Lab - Social Engineering: (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Research and identify social engineering attacks
Background / Scenario
Social engineering is an attack with the goal of getting a victim to enter personal or sensitive information, this
type of attack can be performed by an attacker utilizing a keylogger, phishing email, or an in-person method.
This lab requires the research of social engineering and the identification of ways to recognize and prevent it.
Required Resources
PC or mobile device with Internet access
b. What are three examples of social engineering attacks from the first two methods in step 2a?
Phishing, as shown in the article, A recent scam sent phishing emails to users after they installed cracked
APK files from Google Play Books that were pre-loaded with malware.
Phishing, Another example would be someone posing as someone you know to try and learn something
useful about you such as your Mother’s maiden name to help with a security question.
Spear Phishing, an example would be someone trying to target someone by posing as someone with a
high clearance such as a CTO requesting a wire transfer.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 2 www.netacad.com
Lab - Social Engineering
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 2 www.netacad.com