Question

You have been asked to create a spear phishing email that will entice the faculty and...

You have been asked to create a spear phishing email that will entice the faculty and staff of the Trent University Forensics Department into visiting your website, which is configured to automatically install malware on their computers. What planning would you do prior to sending the email? Write the contents of the email. Why do you think that this would be an effective phishing attack?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Phising : It is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers and sensitive information without their knowledge that it is being extarcted from them. There are different types of phising techniques. We are going to dicuss one of them.

Spear phising : It is type of phising in which the attacker already knew some information about the target. It gives much possiblity the target may fall for the trap. These could be gleaned from a previous phishing attempt, a breached account, or anywhere else they might be able to find out personal information.

Details to be known prior to sending email : In this case , one need to know the staff email's , principal's mail. Bank person's information ( name, mail id, phone number) It is just a sample, one can get much information about for successful perpetration.

Plan : we will be using principal's mail to send a malware in form of an attachment. We will circulate it with faculty and staff. As we are targeting a group we need to be generic in selection of what is to be sent. Here we are stating it as a new bank account is being offered for all the staff members of the university. Please update the details necessary for it.

-----------------------------------------------

Mail

From : Principal's mail id

To : Staff' mail id's

Sub :New Bank Account for the staff

Content :

Bank name : xxx

Contact person : xxxxxx

Position : xxxx

Mail : xxxxx

A warm regard to all the staff. On occasion of university's anniversary , we are being offered an account in reputed bank. Please help provide required detail's from the attachment. Please also visit their website for detailed plan's and revert to them.

link : xxxxxxxxx

Regards,

Principal's Name

Trent University

-------------------------------------

I think this would be effective as the mail is being sent from principal's mail address, everyone will think it as legitimate. As we mentioned point of contact from the reputed bank , they may even search and confirm that it is not fake identity. Also we sent an attachment (Malware in form of trojan) which requires details.

Add a comment
Know the answer?
Add Answer to:
You have been asked to create a spear phishing email that will entice the faculty and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Why do you think that this would be an effective phishing attack?

    You have been asked to create a spear phishing email that will entice the faculty and staff of the Trent University Forensics Department into visiting your website, which is configured to automatically install malware on their computers. What planning would you do prior to sending the email? Write the contents of the email. Why do you think that this would be an effective phishing attack? 

  • Recently we have seen many large corporations boycott advertising on Facebook. Why are they doing this?

    QUESTION 5 You have been asked to create a spear phishing email that will entice the faculty and staff of the Trent University Forensics Department into visiting your website, which is configured to automatically install malware on their computers. What planning would you do prior to sending the email? Write the contents of the email. Why do you think that this would be an effective phishing attack? QUESTION 6Recently we have seen many large corporations boycott advertising on Facebook. Why are they doing this?Do you...

  • You have been hired as database administrator for Athabasca University and the computing services director asked you to...

    You have been hired as database administrator for Athabasca University and the computing services director asked you to tune the following database that is too slow for query processing. The database has two relations: Professor(sin, prof_name, office_no, age, gender, specialty, dept_did) Department(did, dept_name, budget, nbr_programs, chair_sin) After examining the application you found that the following queries are the five most common queries in the workload for this university application and that all are roughly equivalent in frequency and importance: o...

  • Database design Part One (Conceptual Database Design) As a database developer, you have been asked to...

    Database design Part One (Conceptual Database Design) As a database developer, you have been asked to design a new database the operation of the new project within the Liverpool John Moores University (LJMU). LJMU i planning to deliver a number of professional training courses in Al. Each course is delivered by one member of staff at LJMU's Training Centre; each staff is allocated a staff number. The policy of LJMU is to record the start working date of each staff,...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • 6 points: Forensics Install the Autopsy tool from sleuthkit: https://www.sleuthkit.org/autopsy/ Making use of this tool...

    6 points: Forensics Install the Autopsy tool from sleuthkit: https://www.sleuthkit.org/autopsy/ Making use of this tool load the 'Lone Wolf' image from: PLEASE NOTE: this image in >12GB. https://drive.google.com/open?id=1JSvCeZgo2mfnPy8Y41qZqU5bms1PSq0G (Links to an external site.)Links to an external site. and analyse this image to begin a forensic examination. PLEASE NOTE: this image in >12GB.   A quick 'getting started' guide was presented in this weeks lecture. Analysis of this image can take ~30 minutes on mid range hardware. This should not affect your...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • And there was a buy-sell arrangement which laid out the conditions under which either shareholder could...

    And there was a buy-sell arrangement which laid out the conditions under which either shareholder could buy out the other. Paul knew that this offer would strengthen his financial picture…but did he really want a partner?It was going to be a long night. read the case study above and answer this question what would you do if you were Paul with regards to financing, and why? ntroductloh Paul McTaggart sat at his desk. Behind him, the computer screen flickered with...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT