Students audit their own (or a fictional character's) digital footprint to see what information is publicly available. They discuss how attackers use Open Source Intelligence (OSINT) to craft targeted social engineering attacks.

Similar Lessons