You are required to write a report to present information collected from online resources about a business organisation and create a sophisticated phishing-type cyber attack strategy using the collected information that has the potential to exploit that information. The purpose of this assessment is for you to demonstrate that you understand how hackers can exploit publicly available information to orchestrate phishing attacks that might occur in your own workplace or professional setting, so that you can identify the issues and challenges that need to be addressed to develop successful strategies to mitigate those attacks.
The targeted Course Learning Outcomes for this assessment are:
This task requires you to produce a thorough investigation of an arbitrarily selected company. You can select any organisation you feel appropriate. You need to complete the template provided with this document and come up with a phishing attack strategy as part of this exercise. Students can use any suitable tools to find information about the target company. This is like finding “competitive intelligence” on a competitor company. At the beginning, as part of this exercise, you will need to select a real-life organisation. After the selection, you should try to find as much information as possible about the organisation using online resources or tools available.