Professional Documents
Culture Documents
Quezon City
In Partial Fulfillment
of the Requirement of the Course
General Education Elective 2
(GEE002)
Presented by:
Section: ACTCY22S3
<Date of submission>
05/10/23
TOPIC: <TOPIC>
The moral lesson that can be derived from this topic is the importance of being cautious
and aware of potential cyber threats. In today's digital age, we rely heavily on technology
and the internet, making us vulnerable to cyber attacks. Social engineering is one of the
tactics used by cybercriminals to gain access to sensitive information, and it is essential
to stay vigilant and informed about potential threats.
Social engineering is a growing cybersecurity threat, and it is imperative that individuals and
organizations understand cybercriminal tactics and protect themselves. Collecting data such as
statistics, examples, case studies, and expert opinions can provide valuable insight into the
frequency and success of social engineering attacks, as well as effective countermeasures.
Through training programs and security protocols, individuals can learn how to recognize and
prevent social engineering attacks and how to respond effectively when an attack occurs.
Especially in today's digital age, where we rely heavily on technology and the internet, it is
important to be vigilant and aware of potential cyber threats.
By taking proactive measures to protect yourself from cyberattacks, you can minimize your risk and
protect your personal and professional information. Overall, understanding social engineering and
its implications for cybersecurity is essential for anyone wishing to use technology to maintain their
privacy and security online.
V. Reference
Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of
security. John Wiley & Sons.
This book provides an in-depth exploration of social engineering and how attackers manipulate
human behavior to gain access to sensitive information.
Hadnagy, C. (2010). Social engineering: The art of human hacking. John Wiley & Sons.
This book covers the various techniques used in social engineering attacks, including phishing,
pretexting, and baiting, and provides practical advice on how to protect against these threats.
The National Institute of Standards and Technology (NIST). (2018). Framework for Improving
Critical Infrastructure Cybersecurity.
This framework provides a set of guidelines and best practices for organizations to manage and
reduce cybersecurity risk, including measures to protect against social engineering attacks.
Project Part 1:
1. The group must submit 1 topic proposal that contain following:
a. topic
b. brief description
c. collection of data needed for AVP
2. You may propose any of the following or you may add the topic that you like.
● social engineering
● copyright infringement
● trademark infringement
● patent infringement
● plagiarism
● identity theft
● ethical hacking
● others
3. The group may use powtoon or similar application to create audio video presentation
Note: visit and create an account to www.powtoon.com or you may use any tools.
Project Part 2: Final Project Requirement (Submit on or before March 10, 2021)
Note: Use powtoon application or similar application