If you have not been a victim or do not know a victim of a successful social engineering or phishing attack, conduct research on social engineering and to locate an example of a company or person who has been a victim. In a 3-4 page APA format, use credible sources to address the following:
Evaluate and describe 10 methods of social engineering.
Describe the attack method used on you, someone you know, or an attack case in your research.
Analyze why the attack was successful.
What additional training or knowledge on the victim’s part might have stopped the attack?
What do you think is the most important misconception or knowledge gap the general public has about these kinds of attacks?
What countermeasures and other steps would be effective in closing those gaps?
Requirements: 3-4