Professional Documents
Culture Documents
Discussion
Social engineering explained
The Cyber Kill Chain®
Background
Statistics
Threat vectors
How to decrease vulnerabilities
Recommendations
Closing remarks
3
(Hassold, 2021)
4
(Pilette, 2021)
BUSINESS SENSITIVE / TECHNOLOGY VISION 3D
SOCIAL ENGINEERING ATTACK FORMS
(Cognate, 2021)
11
(Accenture, 2021)
BUSINESS SENSITIVE / TECHNOLOGY VISION 3D
RANSOMWARE PROCESS
(Gantenbein, 2022)
(NCSC, n.d.)
13
15
Accenture. (2021). Threats unmasked cyber threat intelligence report. Retrieved February 27, 2022, from https://www.accenture.com/_acnmedia/PDF-158/Accenture-2021-Cyber-Threat-Intelligence-
Report.pdf
Cognate. (2021, August 29). Ransomware Attack Statistics 2021 - Growth & Analysis. Retrieved February 20, 2022, from https://www.cognyte.com/blog/ransomware_2021/
Coppinger, N. (2020, December 23). The Complete Guide to Phishing Attacks: Varonis Guide. Retrieved February 17, 2022, from https://www.varonis.com/blog/phishing-attacks
Evans, C., & Smith, C. (2019, October). Beyond Obfuscation - National Defense Industrial Association. Retrieved February 27, 2022, from
https://www.ndia.org/-/media/sites/ndia/policy/documents/cyber/beyond-obfuscation_final.ashx?la=en
Fortinet. (n.d.). What is Phishing? Avoiding Email Scams & Attacks. Retrieved February 18, 2022, from https://www.fortinet.com/resources/cyberglossary/phishing
Hassold, C. (2021, May 18). Cyber threat intelligence: How to stay ahead of threats. Agari. Retrieved February 6, 2022, from https://www.agari.com/email-security-blog/what-is-cyber-threat-intelligence/
Lockheed Martin. (2020, January 15). Cyber Kill Chain®. Lockheed Martin. Retrieved February 12, 2022, from https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
NC3. (n.d.). Home. Retrieved February 17, 2022, from https://nc3.go.ke/attack-vectors/
NCSC. (n.d.). Reducing Your Exposure to Cyber Attack. Retrieved February 18, 2022, from https://www.ncsc.gov.uk/information/reducing-your-exposure-to-cyber-attack
Okta. (n.d.). What is an Attack Surface? (And How to Reduce it). Retrieved February 18, 2022, from https://www.okta.com/identity-101/what-is-an-attack-surface/
Pilette, C. (2021, July 26). What is social engineering? A definition + techniques to watch for. Official Site. Retrieved February 5, 2022, from https://us.norton.com/internetsecurity-emerging-threats-what-is-
social-engineering.html
PurpleSec. (2021, August 6). 2021 Cyber Security Statistics Trends & Data. Retrieved February 18, 2022, from https://purplesec.us/resources/cyber-security-statistics/
Salahdine, F., & Kaabouch, N. (2019, April 2). Social Engineering Attacks: A survey. MDPI. Retrieved February 6, 2022, from https://www.mdpi.com/1999-5903/11/4/89/htm
Samantha. (2020, February 25). Email Security: Protecting Yourself Against Phishing Scams. Retrieved February 18, 2022, from https://www.hosting.co.uk/blog/protection-phishing/
US Signal. (2021, September 1). Moving beyond "blinky box" security to defense-in-depth security. Retrieved February 27, 2022, from https://ussignal.com/blog/moving-beyond-blinky-box-security-to- 16
defense-in-depth-security