Information security lab week 2 help

Overview:

In doing this assignment, you will gain a better understanding of information system vulnerability to social engineering.

Summary of tasks:

  1. Select a person close to you
  2. Perform Social Engineering Techniques to gather information about this person
  3. Submit your results and reflection.

Your Task

You will be gathering enough information to be able to impersonate some person in a social engineering exploit:

  • Name
  • Office number, office phone number
  • Department, Department Manager
  • Something personal like a meeting they attend this week, something that gives someone the sense that you are the person you are impersonating
  • Etc.

You can use any open source—telephone books, dumpsters, waste baskets, online information. You will produce a 3 – 5 page report and turn in your source material. Your report will document what you have done and describe your proposed exploit. You will follow the life cycle of social engineering and you will document your tools and methods.

Reflection

  1. What are your thoughts about your results?  Does this cause you any concern? What do you feel you should do to improve your online presence? Include this in your lab document.