Your company has recently adopted a new social media policy that allows members of the marketing department to post important company news, product updates, and special promotions on social websites. The initial pilot period is over, and the project considered a success across the organization. Now, the human resources department wants to use social websites to provide their updates as well,
including job listings, benefits changes, and so on. The CSO has asked you to document negative security impacts of allowing the human resources staff to post their updates as well. Which of the following are the major risks you should report back to the CSO?
A. brute force attacks, DDoS attacks, and SQL injection attacks
B. malware infection, phishing attacks, and social engineering attacks
C. DoS attacks, dictionary attacks, and buffer overflow attacks
D. wardriving attacks, spoofing attacks, and shoulder surfing
B
Explanation: The major risks of allowing human resources staff (or any other staff) to post their updates include: malware infection, phishing attacks, and social engineering attacks.
None of the other listed attacks occur as a result of allowing social media usage.
You might also like to view...
A(n) ________ is like a snapshot of your computer's settings at a particular point in time
Fill in the blank(s) with correct word
An rvalue is
A) a temporary value that cannot be accessed from a different part of the program. B) the right operand of a binary operator. C) a value passed as the rightmost parameter of a function. D) a memory location that is associated with a name that can be used by different parts of the program to access the memory location. E) None of the above