![]() ![]() From a technical perspective, it is usually easier to steal information from a physically not secured device/environment than from a physically secured device/environment. Physical security can be considered as an essential aspect of cybersecurity. You can also consider using Kali VM on your computer for this lab the only thing is that you will have to log in to your e-mail service from the browser.Īfter completing all of these pre-checks:īe cautious and don’t click any link as it may contain links to malicious websites and filesģ) Take a screenshot of the phishing/spam e-mailĤ) Explain why it is a spam e-mail Section-2: Physical Security Lab Check your antivirus definition database to confirm that it is up-to-date. Important: Before starting this lab, make sure that your browser and e-mail client is up-to-date. These kinds of phishing e-mails use the browser or e-mail client's vulnerabilities on which you open the e-mail. ![]() Phishing e-mails are considered spam/junk e-mail by most e-mail service providers such as Gmail and Outlook.Īdvanced and targeted phishing e-mails may harm your computer, even if you haven't clicked on any link in the e-mail, meaning that just opening the e-mail might harm your computer. Phishing e-mails can be regarded as a scalable and automated way of making social engineering attacks. Phishing e-mails is one of the methods that hackers can use in social engineering campaigns. The main goal is to convince people to do something for the hacker, such as sharing a password, doing some configuration, etc. Because it requires interacting with people in person or over the phone. Social engineering attacks are usually performed case by case, meaning that it is not generally possible to automate and scale the tasks. It shows how things can be more comfortable for malicious users and especially for an insider when physical security is not strong. The second section of the lab is a simulation of a physical security breach. Please be careful and don’t click in the links in the e-mail you found. You will search your junk e-mail folder to find a spam/phishing e-mail and provide insights on the discovered e-mail. The first section of Lab-11 will be different than what you have been doing in the Labs till today. ![]() Lab-12: Social Engineering and Physical Security ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |