Explain social engineering

What will be an ideal response?

Answer: Social engineering attacks use deception to obtain unauthorized access to information resources, such as attackers who post as a janitor or as a legitimate system user. Employees must be trained not to divulge passwords or other information about their accounts to anyone who contacts them and claims to be part of the organization's security team.

Business

You might also like to view...

Checks of museum floor tile wear patterns, library check–out records, and agency appointment records are examples of which one of the following?

A. Direct observations D. "Pseudo–research" B. Motivational research E. Focus group research C. Indirect or unobtrusive measures

Business

The cost of capital is a dynamic concept and it is affected by economic and firm-specific factors such as business risk and financial risk

Indicate whether the statement is true or false

Business