You are on page 1of 5

Technological Institute of the Philippines

Quezon City

Understanding Social Engineering and its Impact on Cybersecurity

In Partial Fulfillment
of the Requirement of the Course
General Education Elective 2
(GEE002)

Presented by:

<Ortega, Zebedee Seth D. / BSARCH>

Section: ACTCY22S3

Presented to: NOEL PAOLO DOMINGO


____________________

<Date of submission>
05/10/23

TOPIC: <TOPIC>

I. Screen shots <powtoon or any tool>


<Figure 1 label>

< Figure 2 label >

< Figure n label >


Video link: https://drive.google.com/drive/folders/1wMtIxs6WibDhncyyK6_CPDiCXbE2XsnX?
usp=share_link

II. Moral Lesson

The moral lesson that can be derived from this topic is the importance of being cautious
and aware of potential cyber threats. In today's digital age, we rely heavily on technology
and the internet, making us vulnerable to cyber attacks. Social engineering is one of the
tactics used by cybercriminals to gain access to sensitive information, and it is essential
to stay vigilant and informed about potential threats.

IV. Individual Synthesis <50 words minimum>

Social engineering is a growing cybersecurity threat, and it is imperative that individuals and
organizations understand cybercriminal tactics and protect themselves. Collecting data such as
statistics, examples, case studies, and expert opinions can provide valuable insight into the
frequency and success of social engineering attacks, as well as effective countermeasures.

Through training programs and security protocols, individuals can learn how to recognize and
prevent social engineering attacks and how to respond effectively when an attack occurs.
Especially in today's digital age, where we rely heavily on technology and the internet, it is
important to be vigilant and aware of potential cyber threats.

By taking proactive measures to protect yourself from cyberattacks, you can minimize your risk and
protect your personal and professional information. Overall, understanding social engineering and
its implications for cybersecurity is essential for anyone wishing to use technology to maintain their
privacy and security online.

V. Reference

Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of
security. John Wiley & Sons.
This book provides an in-depth exploration of social engineering and how attackers manipulate
human behavior to gain access to sensitive information.

Hadnagy, C. (2010). Social engineering: The art of human hacking. John Wiley & Sons.
This book covers the various techniques used in social engineering attacks, including phishing,
pretexting, and baiting, and provides practical advice on how to protect against these threats.

Verizon. (2021). 2021 Data Breach Investigations Report.


This annual report provides statistics and insights into data breaches and cyber attacks, including
those involving social engineering.

Sjouwerman, S. (2016). Social engineering: The basics. KnowBe4.


This white paper provides a beginner's guide to social engineering and its impact on cybersecurity,
along with tips for identifying and preventing attacks.

The National Institute of Standards and Technology (NIST). (2018). Framework for Improving
Critical Infrastructure Cybersecurity.
This framework provides a set of guidelines and best practices for organizations to manage and
reduce cybersecurity risk, including measures to protect against social engineering attacks.

GEE002 Final Project Audio-Video Presentation (AVP) Regulation

Project Part 1:
1. The group must submit 1 topic proposal that contain following:
a. topic
b. brief description
c. collection of data needed for AVP

2. You may propose any of the following or you may add the topic that you like.
● social engineering

● copyright infringement

● trademark infringement

● patent infringement

● plagiarism

● slander and libel

● identity theft

● ethical hacking

● others

3. The group may use powtoon or similar application to create audio video presentation
Note: visit and create an account to www.powtoon.com or you may use any tools.

Project Part 2: Final Project Requirement (Submit on or before March 10, 2021)
Note: Use powtoon application or similar application

1. Minimum of 1 minute play time not exceeding 3 minutes


2. All members must participate in the project
3. Title must be display before the presentation
4. Subtitle is required
5. Discuss the moral lesson of the video
6. Member’s Contribution is required
7. It must be mp4 format
8. The group must submit the Final Project document in MS Word format

NOTE: Final Project Deliverables

1. Video presentation (powtoon or any applicable tool)


filename: TeamName_TOPIC_SECTION.MP4
2. Final project document filename: TeamName_TOPIC_SECTION.DOCX

You might also like