Hacking and Social Engineering

Overview
For your second assignment, you will research one type of attack from the bulleted options provided. In your paper, you will provide the attack’s background and history, and ways to prevent a similar attack. You will also find an article describing a specific example of the type of attack you selected.

Baiting.
Phishing.
Pretexting.
Scareware.
Spear phishing.
Tailgating.
Vishing.
Watering hole.
Whaling.
Instructions
Download and use the required Week 6 Assignment Template to complete your assignment. Write a 1–2 page paper using the following instructions:

Introduction

Describe three background or historical details about this type of attack.
First objective

Provide three details about the specific attack you located.
Second objective

Describe three ways to prevent a similar attack.
Sources
Use three sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment.
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

Examine hacking theory, social engineering tactics, and hacker subculture

Our customer support team is here to answer your questions. Ask us anything!