OUTCOME: Describe and recognise social engineering attacks.
After watching the video above answer the following questions:
What is a social engineering attack?
What is commonly the most productive type of social engineering attack?
What are some defenses against social engineering attacks?
1st Module of information privacy and security