Objective:
- Define the steps used in typical digital attacks.
- Define social engineering as the human risk in organization security.
- Identify techniques for social engineering and how to mitigate against these techniques.
Standards:
- CYBER.ORG Cybersecurity Learning Standards
- 9-12.SEC.PHYS -Analyze the different types of attacks that affect physical security
- CSTA Compatibility Standards
- 3A-IC-29 :Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
Guiding Question:
How can we protect against social engineering?
Resources:
- 2.1.1 – Social Engineering.pptx Presentation available on Google Classroom
Assignment:
- Follow along with the 2.1.1 – Social Engineering.pptx presentation in today’s class.
- Complete the Seven Steps of Hacking Activity in class using the materials provided.
Assigned: August 27th, 2025
Teacher Pacing Due Date: August 27th, 2025