Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 7

CodeHS Lessons

Consult a variety of sources to research attack methods and create a report on at least two events. For example, show how social engineering (e.g., baiting, phishing/spear phishing, pretexting/ blagging, tailgating, quid pro quo, etc.) led to the breach of an organization.

6.1 Project Security Assessment Report