imagine that an international organization has hired a national agency
For this task, imagine that an international organization has hired a national agency to levy phishing, spear phishing, and whaling attacks on a local competitor. The purpose of the attacks is to gain unauthorized access to the local company’s business systems at a later date. In this scenario, the nature of the event is the malicious action by the international organization. The spam email that is received and accessed by employees of the local competitor results in users being tricked into providing their logon credentials. The hackers then use the credentials to gain access to the local competitor’s business systems and information. It is critical that the events of the attacks be detected quickly because the local competitor is planning a marketing action, and the international organization could use this hacked information to get to their product or service to the market sooner.
Write a paper that addresses the following:
Differentiate between phishing, spear phishing, and whaling attacks.
Delineate risk responses in terms of:
Determine risk mitigation through the application of industry best principles and practices and information security policies.
Determine risk mitigation through the application of well-known commercial tools such as PhishMe and PhishGuru.
Develop a plan for monitoring the infrastructure for security-related events.
Develop a plan for securing information assets.
Provide details on security awareness, training, and education.
Length: 5-7 pages, not including titles and reference pages.
Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.
Phishing is a social engineering attack that happens when external attackers use their impersonation skills to gain access to sensitive information from a targeted place or organization. They gain access by pretending to have a legitimate entity of the information, and they do this by waging a larger scope of attack in the hope that some people will take the bait and respond. A sphere phishing attack happens when an attacker targets specific employees