Question: 1. Read the following articles: Security Tip (ST04-014_Avoiding Social Engineering and Phishing Attacks https://us-cert.cisa.gov/ncas/tips/ST04-014 Avoiding Social Engineering and Phishing Attacks CISA.pdf Avoiding Social Engineering and
1. Read the following articles:
- Security Tip (ST04-014_Avoiding Social Engineering and Phishing Attacks
- https://us-cert.cisa.gov/ncas/tips/ST04-014 Avoiding Social Engineering and Phishing Attacks CISA.pdf Avoiding Social Engineering and Phishing Attacks CISA.pdf - Alternative Formats
- Oregon FBI Tech Tuesday: Building a Digital Defense Against Phishing and Spear Phishing Attacks https://www.fbi.gov/contact-us/field-offices/portland/news/press-releases/oregon-fbi-tech-tuesday-building-a-digital-defense-against-phishing--spear-phishing-attacks
- Oregon FBI Tech Tuesday Building a Digital Defense Against Phishing_and Spear P.pdf Oregon FBI Tech Tuesday Building a Digital Defense Against Phishing_and Spear P.pdf - Alternative Formats
2. Research successful phishing campaigns using sound academic sources and select a phishing campaign and analyze the effectiveness of the campaign.3. Complete an analysis of the campaign you choose and include:
- Research and cite TWO intelligence sources. (Use APA formatting for the citations)
- Describe the campaign in two or three sentences.
- Identify the type of phishing campaign that was used and provide an example if available.
- Identify the methods used by the attacker that made the attack effective.
- Develop an opinion on why the attack was successful.
- Identify THREE mitigation techniques that could be implemented to prevent the attack.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
