Primer on Social Engineering and Mining

As we continue to see a rise in various kinds of attempts to take advantage of our network, here again is a simple review of some of those ways being used. Bottom line, PLEASE STAY VIGILANT to STAY SAFE!

Social engineering is an attempt to trick an individual into revealing information or taking an action that can be used to attack systems or networks. Social mining is an attempt to gather information about the organization that may be used to support future attacks.

Examples of commonly used types of social engineering:

phishing Phishing is a digital form of social engineering that uses authentic-looking emails to trick users into sharing personal information. It usually includes a link that takes the user to a fake website. If you cannot verify the source, do not open the link. Report suspicious messages to your IT team.

  • Spear Phishing is a type of phishing where a specific user or group of users is targeted because of their position (such as a company’s administrators).
  • Quishing, short for QR code phishing, is a type of phishing where a QR code is used to trick users into visiting malicious websites or downloading malware.

social media Social media exploitation is where the attacker uses information found on a user’s social media profiles to create a targeted phishing attack.

Pretexting and Impersonation is where the attacker creates a fictional backstory that is used to manipulate someone into providing private information or to influence behavior. Attackers will often impersonate a person of authority, co-worker, or trusted organization to engage in back-and-forth communication prior to launching a targeted spear phishing attack.

  • calling Fake IT Support calls are a common form of impersonation where someone pretends to be an authorized user or administrator in an attempt to gain illicit access to protected data systems. The attacker has enough information to sound credible, and they ask the user for some bit of information that will allow the attacker to gain access to the desired system.

Baiting is the use of a false promise to lure the user into a trap, including enticing ads that lead to malicious sites or encourage users to download a malware-infected application.

  • scareware Scareware is a type of baiting where the use of false alarms or fictitious threats lure the user into a trap. One example is the attacker convincing a user that their system is infected with malware and that they should install software granting remote access. Another example is the attacker claiming to have sensitive videos which will be released if the user does not pay.
  • Quid pro quo is a type of baiting where the attacker requests the exchange of some type of sensitive information such as critical data, login credentials, or monetary value in exchange for a service. For example, a user might receive a phone call from an attacker who, posed as a technology expert, offers free IT assistance or technology improvements in exchange for login credentials.

coming in with someone elseTailgating, also known as “piggybacking”, is where an unauthorized person manipulates their way into a restricted area, such as impersonating a well-known role (e.g., delivery driver or custodian worker) or asking a user to “hold the door”.

  • Thread-jacking is a type of digital tailgating where the attacker replies to an existing email exchange, inserting themselves into a legitimate conversation.

avoidsnoopsShoulder surfing is where an unauthorized person stands near a user to get the user’s password or other data from the user’s computer monitor.

  • Angle your computer so that other people cannot see what you are typing

    Use a privacy screen to make your screen less visible to others

    If possible, sit or stand with your back to a wall when entering a password on a device in public

    Try to avoid viewing restricted information in public

    Shield forms from viewing when filling out paperwork

    Use strong passwords to make it more difficult for someone to guess what you typed

    Remember to lock your computer or device when you leave your desk

Did You Know? Focus Mode in Chromebooks

Chromebook focus mode

Distractions are a major challenge for students. Chromebook’s built-in Focus mode can help. This simple tool minimizes interruptions, creating a dedicated work environment.

What Focus Mode Does:

  • Sets a timer for focused work.
  • Silences notifications.
  • Integrates with Google Tasks (optional).
  • Offers calming sounds (optional).

How Students Can Use It:

  • Study Sessions: Block out distractions during homework or test prep.
  • Writing Time: Concentrate on essays or creative writing.
  • Project Work: Deep dive into research or project development.
  • Reading: Focus on comprehension without interruptions.

Tips for Teachers:

  • Demonstrate: Show students how to access and use Focus mode.
  • Encourage Regular Use: Suggest incorporating Focus mode into daily routines.
  • Discuss Benefits: Talk about the positive impact of focused work on learning.

Focus mode is a simple yet powerful tool to help students develop concentration skills and improve their academic performance. Encourage your students to give it a try! Here’s a guide from Google on how to activate it. https://support.google.com/chromebook/answer/15642977?hl=en 

focus mode

Unleash Student Creativity with Adobe Express

adobe express blog

Are you looking for a dynamic tool to empower your students’ creative expression? Adobe Express (formerly Adobe Spark) is available within our district, offering a powerful platform for visual storytelling and project-based learning.

While you might be familiar with similar design tools like Canva, Adobe Express stands out with its simple and intuitive video creation capabilities. Students can easily craft engaging video projects, incorporating multimedia elements and fostering digital literacy skills using the robust stock library. Beyond video, the integrated AI image generator opens up exciting new avenues for visual exploration. Students can use text prompts to generate unique images, sparking imagination and adding a distinctive touch to their work. The AI image generator is safe to use with students in all grades.

Adobe Express offers more than just design templates. It’s a platform that allows students to amplify their voices and showcase their unique perspectives. From presentations and infographics to digital storytelling and social media campaigns, this tool empowers students to communicate effectively and creatively. Integrate Adobe Express into your curriculum to:

  • Boost student engagement: Transform learning into interactive and visually compelling experiences.
  • Develop essential skills: Foster digital literacy, communication, and critical thinking.
  • Encourage creative expression: Provide a platform for students to share their ideas and perspectives.

Explore the possibilities of Adobe Express and witness the incredible work your students can create.

Students can access Adobe Express through Clever or it can be found and accessed through the waffle.

Reach out to a Technology Integration Specialist (submit a tech ticket) if you’d like assistance using this platform with students.