Grand Canyon University Phishing Attack Reflection
Description
In this assignment, use open source intelligence tools such as the OSINT framework, Facebook, LinkedIn, Pinterest, and other social media websites to research a family member. Choose and create two attacks from the list below and include examples.
- Spear Phishing Attack
- Phishing attack
- Whaling Attack
- Vishing Attack
- Smishing Attack
Note: Do not send the attacks.
Part 2:
Write a 250- to 500-word reflection discussing the moral and ethical considerations as they relate to cyberstalking from a Christian worldview of human flourishing. What other abusive behaviors can be performed through the tools we have used, and why, as cybersecurity professionals, must we be ever vigilant in our ethical decisions? Examine how the internet is used for cybercrime, cyberstalking, and other abusive behaviors. Include at least one biblical reference in your response.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."