Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 16
Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 23
Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 1
Tailgating and Piggybacking - Social Engineering Tactics Explained by LabCyber
In today's video, I am going to be discussing two very common forms of social engineering which are tailgating piggybacking. These tactics are often used by cyber criminals to gain unauthorized access into secure buildings and rooms.
Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 15
How to avoid falling for phishing scams by Channel News Asia
Here's a quick guide on what you can do to avoid falling victim to phishing attempts.
Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 17
What is Spear Phishing | Difference from Phishing and Whaling by MalwareFox
In this video, you will know what spear phishing is, and its difference from phishing and whaling.
Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 21
Information Security (2020, May 20). INFOGRAPHIC: 22 Social Engineering Red Flags [Infographic].
Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 19