Social Engineering and Cybersecurity Analysis, GCU, 2022
VerifiedAdded on 2023/02/06
|6
|1031
|21
Homework Assignment
AI Summary
This assignment, completed for a Cyber Warfare and Applications course at Grand Canyon University, explores social engineering techniques, specifically focusing on spear phishing attacks targeting social media users. The first part of the assignment details how attackers can use fake login pages and deceptive tactics to steal user credentials and information. The second part delves into the ethical considerations of cybersecurity, discussing online behavior, cyberbullying, and cyberstalking. It emphasizes the importance of ethical conduct, referencing religious principles and the role of ethical hackers in safeguarding networks. The assignment highlights the need for vigilance and the responsible use of technology to prevent malicious activities and protect individuals and organizations from cyber threats.

1
Social Engineering
Francis Ogunjimi
Grand Canyon University
Cyber Warfare and Applications
Dr. Sean Atkinson
24th August , 2022.
Social Engineering
Francis Ogunjimi
Grand Canyon University
Cyber Warfare and Applications
Dr. Sean Atkinson
24th August , 2022.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
PART 1
In order to build a spear phishing assault that targets a user of Facebook, Instagram, or LinkedIn,
I would lure the user using a page that looks exactly like Facebook and then pose it as a security
alert or password-reset request. Users of social media share a common dread of having their
accounts locked, if one looks at the psychology of these users. A warning that the user's account
might be blocked at any time if they don't update their password may send shivers down their
spine, forcing them to immediately follow the method. Including a few extra questions, such the
user's birthdates, can help allay suspicions while also revealing a lot about the individual. (Hong,
J. ,2012)
For a phishing attack, I would make a phony website—for instance, one for Coca-Cola—that
seems real and, when clicked, asks the user to input their information to be eligible for an offer.
This can be done simply copying the webpage of the real company and adding a few fictitious
remarks to the bottom of the form. Using myschool.edu/finance as opposed to a misspelled
domain name Myschool.edu.finance.com could be used instead. The user might not be aware of
an attack because of the similarities. Attackers can reach thousands of people with phishing
emails, and some of them might fall for the scam, causing them to lose money or crucial
information.
PART 1
In order to build a spear phishing assault that targets a user of Facebook, Instagram, or LinkedIn,
I would lure the user using a page that looks exactly like Facebook and then pose it as a security
alert or password-reset request. Users of social media share a common dread of having their
accounts locked, if one looks at the psychology of these users. A warning that the user's account
might be blocked at any time if they don't update their password may send shivers down their
spine, forcing them to immediately follow the method. Including a few extra questions, such the
user's birthdates, can help allay suspicions while also revealing a lot about the individual. (Hong,
J. ,2012)
For a phishing attack, I would make a phony website—for instance, one for Coca-Cola—that
seems real and, when clicked, asks the user to input their information to be eligible for an offer.
This can be done simply copying the webpage of the real company and adding a few fictitious
remarks to the bottom of the form. Using myschool.edu/finance as opposed to a misspelled
domain name Myschool.edu.finance.com could be used instead. The user might not be aware of
an attack because of the similarities. Attackers can reach thousands of people with phishing
emails, and some of them might fall for the scam, causing them to lose money or crucial
information.

3
References
Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74-81.
Laszka, A., Vorobeychik, Y., & Koutsoukos, X. (2015, February). Optimal personalized
filtering against spear-phishing attacks. In Proceedings of the AAAI Conference on
Artificial Intelligence (Vol. 29, No. 1)
Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing Attacks: Recent
Comprehensive Study and a New Anatomy. Frontiers in Computer Science, 3, 6.
References
Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74-81.
Laszka, A., Vorobeychik, Y., & Koutsoukos, X. (2015, February). Optimal personalized
filtering against spear-phishing attacks. In Proceedings of the AAAI Conference on
Artificial Intelligence (Vol. 29, No. 1)
Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing Attacks: Recent
Comprehensive Study and a New Anatomy. Frontiers in Computer Science, 3, 6.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
PART 2
Cybersecurity is a growing problem that needs to be addressed. These actions are carried out, in
part, by terrorist groups and anyone looking to make quick cash from a foreign government.
Behavior is defined as morality, which includes what is good, right, and wrong. Cyberspace The
responsibility of one's online behavior is referred to as morality. (Essaaidi & Bennasar, 2017)
Online shoppers also used living beings flesh websites, a Cantonese euphemism for their desire
to locate a particular individual in order to engage in premeditated verbal harassment against it.
Cyberbullying can involve spreading false information or rumors about a single man in order to
undermine the defendant's reputation, relationships, and job. On websites, social media, message
boards, the internet, and some other digital platforms, false information is disseminated with the
intention of hurting people's decisions and the reputations of organizations. (Dogaru &
Dumitrache, 2017).
The term "cyber stalking" refers to a pattern of actions or conduct used over time to harm, scare,
terrify, or humiliate someone, including the relatives of the deceased, lovers, or coworkers.
These actions and behaviors include, but are not limited to, bombarding the customer's inbox
with messages, frequently placing advertisements on their user's news websites, sites like
Instagram, and persistently calling them. Be watchful and watch the universe with a vision that
reveres God. The unintended consequences of our advertising, alerts, and other public
information must be taken into account. In this aspect, we must consider whether we will be
building His unique rule or obeying Him. (Pavur & Martinovic, 2020).
Another of God's Laws to His followers is "don't really steal." Not hardly can we not cheat as
Evangelical data scientists, even but we have complete skills to do just that, and we already
avoid loss by safeguarding data management. We assess both those programs and fix them as
thieves discover or abuse them.
Ethical hackers now employ much of the same talents as fraudsters, and rather than violent fraud,
they use them to safeguard networks and preserve evidence. These respected experts work to
prevent as well as counter criminal activity. "The Law of the LORD is perfect," says Psalms
19:7-10, saying, "The LORD's judgments are genuine and upright entirely." (Myftari, 2021).
PART 2
Cybersecurity is a growing problem that needs to be addressed. These actions are carried out, in
part, by terrorist groups and anyone looking to make quick cash from a foreign government.
Behavior is defined as morality, which includes what is good, right, and wrong. Cyberspace The
responsibility of one's online behavior is referred to as morality. (Essaaidi & Bennasar, 2017)
Online shoppers also used living beings flesh websites, a Cantonese euphemism for their desire
to locate a particular individual in order to engage in premeditated verbal harassment against it.
Cyberbullying can involve spreading false information or rumors about a single man in order to
undermine the defendant's reputation, relationships, and job. On websites, social media, message
boards, the internet, and some other digital platforms, false information is disseminated with the
intention of hurting people's decisions and the reputations of organizations. (Dogaru &
Dumitrache, 2017).
The term "cyber stalking" refers to a pattern of actions or conduct used over time to harm, scare,
terrify, or humiliate someone, including the relatives of the deceased, lovers, or coworkers.
These actions and behaviors include, but are not limited to, bombarding the customer's inbox
with messages, frequently placing advertisements on their user's news websites, sites like
Instagram, and persistently calling them. Be watchful and watch the universe with a vision that
reveres God. The unintended consequences of our advertising, alerts, and other public
information must be taken into account. In this aspect, we must consider whether we will be
building His unique rule or obeying Him. (Pavur & Martinovic, 2020).
Another of God's Laws to His followers is "don't really steal." Not hardly can we not cheat as
Evangelical data scientists, even but we have complete skills to do just that, and we already
avoid loss by safeguarding data management. We assess both those programs and fix them as
thieves discover or abuse them.
Ethical hackers now employ much of the same talents as fraudsters, and rather than violent fraud,
they use them to safeguard networks and preserve evidence. These respected experts work to
prevent as well as counter criminal activity. "The Law of the LORD is perfect," says Psalms
19:7-10, saying, "The LORD's judgments are genuine and upright entirely." (Myftari, 2021).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
It is essential to properly respect an individual's legal and social base in any place of authority,
such as network security, policeman, medics, instructors, and the like. The base is laid by a solid
Religious religion and an ongoing journey with Christ.
It is essential to properly respect an individual's legal and social base in any place of authority,
such as network security, policeman, medics, instructors, and the like. The base is laid by a solid
Religious religion and an ongoing journey with Christ.

6
Reference
Bennasar, H., Bendahmane, A., &Essaaidi, M. (2017, April). An overview of the state-of-the-art
of cloud computing cyber-security. In International Conference on Codes, Cryptology,
and Information Security (pp. 56-67). Springer, Cham.
Dogaru, D. I., &Dumitrache, I. (2017, June). Cyber security in healthcare networks. In 2017 E-
Health and Bioengineering Conference (EHB) (pp. 414-417). IEEE.
Pavur, J., &Martinovic, I. (2020). SOK: Building a launchpad for impactful satellite cyber-
security research. arXiv preprint arXiv:2010.10872.
Myftari, K. (2021). Beyond the Impasse: Prospects for Joint Cooperation between Russia and the
US in Cybersecurity.
Reference
Bennasar, H., Bendahmane, A., &Essaaidi, M. (2017, April). An overview of the state-of-the-art
of cloud computing cyber-security. In International Conference on Codes, Cryptology,
and Information Security (pp. 56-67). Springer, Cham.
Dogaru, D. I., &Dumitrache, I. (2017, June). Cyber security in healthcare networks. In 2017 E-
Health and Bioengineering Conference (EHB) (pp. 414-417). IEEE.
Pavur, J., &Martinovic, I. (2020). SOK: Building a launchpad for impactful satellite cyber-
security research. arXiv preprint arXiv:2010.10872.
Myftari, K. (2021). Beyond the Impasse: Prospects for Joint Cooperation between Russia and the
US in Cybersecurity.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.