Contents
- Overview
- Cyber Talk - Social Engineering - Phishing, Smishing and Vishing Explained
- Document Sharing Security Tips: How to Stay Safe with Shared Docs
- Social Engineering: Cyberattacks Using Emotional Manipulation
- Knowbe4 Pretexting - 'Tech Support' Social Engineering
- Knowbe4 Pretexting - Fake IT Attack
- Knowbe4 Pretexting - Fake IT Password Break-In
- Knowbe4 Pretexting Two-Factor Authentication Attack
Overview
The following learning resources are provided to assist faculty, students, staff (including student employees) in identifying cybersecurity learning resources. In addition to being grouped by Content Area or Role, each resource page has content from three sources:
- Internally produced content - primarily identified as Cyber Talks delivered by GW cybersecurity staff
- Third-party produced content - primarily from KnowBe4
- LinkedIn provided content - primarily what is available to employees through Talent@GW
The page references two primary locations for content
- myGW Group CyberSafe GW
- Content will a "location" of myGW Group - CyberSafe GW describe content available through our myGW group that any GW account holder can access. These item's titles will often link directly to the content for authenticated GW users.
- Talent@GW
- Items with a "Location" of Talent@GW will also require authentication and are currently limited to GW employees. Please note that the best way to find these items is searching for them in Talent@GW using the title. Also, these items maybe available in other LinkedIn subscriptions, so searching for them there may also provide access.
Finally, this page includes notes as to the length of the material, type/format, and suggested audiences that would find the information most relevant.
Cyber Talk - Social Engineering - Phishing, Smishing and Vishing Explained
- Audience: Faculty, Students, Staff
- Location: CyberSafe GW (myGW Group)
- Duration: 60 minutes
- Type: Cyber Talk
- Description:
- Audience: Faculty, Students and Staff (including student employees)
- Location: National Cybersecurity Awareness (Articles)
- Duration: 5 minute read
- Type: External Web Resource
- Source: National Cybersecurity Alliance
Social Engineering: Cyberattacks Using Emotional Manipulation
- Audience: Faculty, Staff (including student employees)
- Location: Talent@GW
- Duration: 5 minutes
- Type: Training Module
Description (click to toggle details)Social engineering is one of the most effective methods used by cybercriminals to gain access to confidential information. This training provides participants with a deep understanding of why social engineering is so successful and how it works. You will learn about the emotional manipulation that attackers use to trick people. The course covers different types of social engineering attacks and uses practical examples to show how to recognize and respond to suspicious requests. Particular emphasis is placed on developing critical awareness in high-pressure situations. Participants will learn effective defense strategies and interactive exercises and a knowledge check quiz will strengthen your ability to contribute to cybersecurity - both in your professional and private lives.
Knowbe4 Pretexting - 'Tech Support' Social Engineering
- Audience: Faculty, Staff (including student employees)
- Location:Talent@GW
- Duration: 5 minutes
- Type: Video Module
Description (click to toggle details)In this video module Kevin Mitnick (world renowned security consultant, public speaker and author) and Rachel Tobac (social engineer and the CEO / Co-founder of SocialProof Security) roleplay a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. Rachel demonstrates and explains how an attacker can gain information about your organization's defenses by pretending to be a member of the tech support team and how this can lead to your organization's network being compromised.
Knowbe4 Pretexting - Fake IT Attack
- Audience: Faculty, Staff (including student employees)
- Location: Talent@GW
- Duration: 5 minutes
- Type: Video Module
Description (click to toggle details)In this video module Kevin Mitnick (world renowned security consultant, public speaker and author) and Rachel Tobac (social engineer and the CEO / Co-founder of SocialProof Security) roleplay a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. In this attack, Kevin explains how he is able to steal the local password and the password for the HR system by pretending to be a member of the IT team.
Knowbe4 Pretexting - Fake IT Password Break-In
- Audience: Faculty, Staff (including student employees)
- Location: Talent@GW
- Duration: 5 minutes
- Type: Video Module
Description (click to toggle details)In this video module Kevin Mitnick (world renowned security consultant, public speaker and author) and Rachel Tobac (social engineer and the CEO / Co-founder of SocialProof Security) roleplay a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. Rachel demonstrates and explains how an attacker can gain access to your organization's network by pretending to be a member of the tech support team and asking you to change your password. She also provides tips on having a password that is less likely to be cracked by hackers.
Knowbe4 Pretexting Two-Factor Authentication Attack
- Audience: Faculty, Staff (including student employees)
- Location: Talent@GW
- Duration: 5 minutes
- Type: Video Module
Description (click to toggle details)n this video module Kevin Mitnick (world renowned security consultant, public speaker and author) and Rachel Tobac (social engineer and the CEO / Co-founder of SocialProof Security) role play a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. Kevin demonstrates and explains how an attacker can gain access to your organization's network by social engineering a user and getting them to divulge their two-factor authentication code
This content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.
IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu
