CIS490 Lab 1: Social Engineering Audit
CIS490 Lab 1: Social Engineering Audit Social engineering attacks are T
Conduct a social engineering audit on various social media websites by collecting data posted by users that could be exploited in social engineering attacks. Analyze your own social media accounts to determine the potential risks posed by the data you have shared. Write a 1–2 page response describing the types of data found on social media platforms that could be used maliciously, and compare it to the data you have shared personally. Based on your analysis, identify any data you will delete or refrain from posting in the future. Submit your written reflection as an attachment on the lab assignment page in BBLearn.
Paper For Above instruction
Social engineering remains one of the most prevalent and insidious forms of cyberattack, largely because it exploits human psychology rather than technological vulnerabilities. This social vulnerability is especially critical given that individuals are often unwitting accomplices in cybersecurity breaches due to the amount of personal information they share on social media platforms. The goal of this paper is to analyze the types of data shared publicly on social media that could be exploited for social engineering attacks, reflect on personal social media use, and discuss the steps to mitigate such risks.
During the data gathering phase, various social media platforms—including Facebook, Twitter, Instagram, LinkedIn, and YouTube—were examined for publicly available information that could be leveraged in social engineering schemes. Commonly, users post personal data such as birth dates, addresses, employment details, family information, travel plans, and event invitations. For example, a user sharing an upcoming vacation date or a family gathering at a specific location might inadvertently reveal their absence from home or their daily routines, providing an attacker with opportunities for impersonation or physical intrusion. Photos tagged with locations, personal contact information, and details about daily activities increase the attack surface, potentially enabling scammers to impersonate trusted contacts or craft convincing phishing messages.
Some specific types of data easily found on social media that pose security risks include personal identifiers (birth dates, phone numbers, addresses), employment details, holiday plans, and social relationships. These pieces of information can be combined to create detailed profiles that support spear-phishing or pretexting attacks. For example, an attacker might use knowledge of an individual’s workplace and recent trip to craft a targeted phishing email, mimicking official communication from that company or travel agency, compelling the victim to disclose confidential information or click malicious links.
In conducting a personal analysis, I reviewed my own social media profiles to identify information that could be exploited. I found that while I had shared some professional details on LinkedIn, I had avoided posting specific addresses, birth dates, or travel plans. However, I recognized that some personal photographs contained location tags and that I had shared general information about my hobbies and family, which could potentially be combined with publicly available data to build a profile of my habits and routines. Consequently, I decided to modify my privacy settings, restrict the visibility of location tags, and refrain from posting detailed plans in the future. I also committed to removing any publicly available data that could be exploited in a social engineering attack, such as specific addresses or sensitive personal details, to better protect myself and others from targeted attacks.
In conclusion, social media platforms serve as a treasure trove for cybercriminals conducting social engineering attacks. The ease with which personal data is shared today amplifies the risk of manipulation and identity theft. Individuals must actively assess the data they share and employ privacy controls to minimize vulnerabilities. Increased awareness and responsible sharing are essential steps to combat social engineering threats effectively. By scrutinizing our own online presence and modifying our sharing habits, we can significantly reduce the risk of becoming unwitting victims of social engineering schemes.
References
- Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.
- Hadnagy, C. (2018). Social Engineering: The Science of Human Hacking. Wiley.
- Gupta, P., & Kumar, S. (2020). Social Engineering Attacks in Cybersecurity: An Overview. Journal of Cybersecurity Studies, 8(3), 45-60.
- Rashid, A., & Nguyen, T. (2019). The Impact of Personal Data Sharing on Security Risks. International Journal of Cybersecurity, 10(4), 213-229.
- Cybersecurity and Infrastructure Security Agency (CISA). (2021). Social Media Security Tips. Retrieved from https://www.cisa.gov/social-media-security
- Marino, J., & Martin, H. (2022). Privacy Controls and Personal Data Management on Social Media. Journal of Digital Privacy, 5(2), 102-117.
- Alasmary, W., & Alhaidari, F. (2021). Protecting Against Social Engineering Attacks through User Awareness. Computers & Security, 105, 102258.
- Mclean, R. (2017). Human Factors in Cybersecurity. Springer.
- Schoenfield, J. (2018). Psychology of Cybersecurity. CRC Press.
- Smith, A. (2020). The Facebook Effect: Understanding the Impact of Social Networks on Personal Security. Cyberpsychology, Behavior, and Social Networking, 23(5), 341-346.