CIS 552 Week 9 Discussion Question
"Social Engineering"
Social engineering requires that a hacker manipulate users to prey on their human weakness/ignorance and willingness to interact. What, in your opinion, are the inherent dangers to you as an IT security professional and a private person? Describe your plans for keeping your family and your professional lives secure. Are there any online tools that can assist with protecting “private” information?
- Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You’ll also be showing your instructor what you've picked up.
CIS 552 Week 9 Discussion Question
"Social Engineering"
Social engineering requires that a hacker manipulate users to prey on their human weakness/ignorance and willingness to interact. What, in your opinion, are the inherent dangers to you as an IT security professional and a private person? Describe your plans for keeping your family and your professional lives secure. Are there any online tools that can assist with protecting “private” information?
- Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You’ll also be showing your instructor what you've picked up.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.