Information security lab week 2 help


In doing this assignment, you will gain a better understanding of information system vulnerability to social engineering.

Summary of tasks:

  1. Select a person close to you
  2. Perform Social Engineering Techniques to gather information about this person
  3. Submit your results and reflection.

Your Task

You will be gathering enough information to be able to impersonate some person in a social engineering exploit:

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now
  • Name
  • Office number, office phone number
  • Department, Department Manager
  • Something personal like a meeting they attend this week, something that gives someone the sense that you are the person you are impersonating
  • Etc.

You can use any open source—telephone books, dumpsters, waste baskets, online information. You will produce a 3 – 5 page report and turn in your source material. Your report will document what you have done and describe your proposed exploit. You will follow the life cycle of social engineering and you will document your tools and methods.


  1. What are your thoughts about your results?  Does this cause you any concern? What do you feel you should do to improve your online presence? Include this in your lab document.

"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"