Question: 1. Read the following articles: Security Tip (ST04-014_Avoiding Social Engineering and Phishing Attacks https://us-cert.cisa.gov/ncas/tips/ST04-014 Avoiding Social Engineering and Phishing Attacks CISA.pdf Avoiding Social Engineering and

1. Read the following articles:

  • Security Tip (ST04-014_Avoiding Social Engineering and Phishing Attacks
  • https://us-cert.cisa.gov/ncas/tips/ST04-014 Avoiding Social Engineering and Phishing Attacks CISA.pdf Avoiding Social Engineering and Phishing Attacks CISA.pdf - Alternative Formats
  • Oregon FBI Tech Tuesday: Building a Digital Defense Against Phishing and Spear Phishing Attacks https://www.fbi.gov/contact-us/field-offices/portland/news/press-releases/oregon-fbi-tech-tuesday-building-a-digital-defense-against-phishing--spear-phishing-attacks
  • Oregon FBI Tech Tuesday Building a Digital Defense Against Phishing_and Spear P.pdf Oregon FBI Tech Tuesday Building a Digital Defense Against Phishing_and Spear P.pdf - Alternative Formats

2. Research successful phishing campaigns using sound academic sources and select a phishing campaign and analyze the effectiveness of the campaign.3. Complete an analysis of the campaign you choose and include:

  • Research and cite TWO intelligence sources. (Use APA formatting for the citations)
  • Describe the campaign in two or three sentences.
  • Identify the type of phishing campaign that was used and provide an example if available.
  • Identify the methods used by the attacker that made the attack effective.
  • Develop an opinion on why the attack was successful.
  • Identify THREE mitigation techniques that could be implemented to prevent the attack.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!