Skip to Main Content

PLP Minor in Cybersecurity: Week 2

Online Articles

Overview of Social Engineering Attacks on Social Networks

This paper gives an overview of Social Engineering attacks on social networks, Social Engineering principles and types.

sciencedirect.net 

Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 11


Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 14


Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 16


Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 23

eBooks

Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 1

Videos

Tailgating and Piggybacking - Social Engineering Tactics Explained by LabCyber

In today's video, I am going to be discussing two very common forms of social engineering which are tailgating piggybacking. These tactics are often used by cyber criminals to gain unauthorized access into secure buildings and rooms. 

Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 15

 

How to avoid falling for phishing scams by Channel News Asia

Here's a quick guide on what you can do to avoid falling victim to phishing attempts.

Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 17

 

What is Spear Phishing | Difference from Phishing and Whaling by MalwareFox

In this video, you will know what spear phishing is, and its difference from phishing and whaling. 

Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 21

Infographics

Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 8

Goldphish (2022, May 3). The Do's & Don'ts For World Password Day [Infographic].

 

Information Security (2020, May 20). INFOGRAPHIC: 22 Social Engineering Red Flags [Infographic]. 

Note: Refer to FCN Lecture 2- Cybersecurity in User Domain: Slide 19