Social Engineering
Select one of the following social engineering attack techniques:
Baiting.
Scareware.
Pretexting.
Phishing.
Vishing.
Tailgating.
Watering hole.
Whaling.
Spear phishing.
In addition, find articles about an instance where the chosen social engineering attack was used.
In a 1–2 page paper, respond to the following items:
Describe the attack in detail.
Describe the technique of the attacks.
Describe the effects of the attack both in general and in the specific instance you found.
Discuss three ways to prevent the attack. Provide a rationale.