Explain social engineering
What will be an ideal response?
Answer: Social engineering attacks use deception to obtain unauthorized access to information resources, such as attackers who post as a janitor or as a legitimate system user. Employees must be trained not to divulge passwords or other information about their accounts to anyone who contacts them and claims to be part of the organization's security team.
You might also like to view...
Checks of museum floor tile wear patterns, library check–out records, and agency appointment records are examples of which one of the following?
A. Direct observations D. "Pseudo–research" B. Motivational research E. Focus group research C. Indirect or unobtrusive measures
The cost of capital is a dynamic concept and it is affected by economic and firm-specific factors such as business risk and financial risk
Indicate whether the statement is true or false