Cyber Security

User Generated

qhayhyh

Programming

Description

CYBER SECURITY

Go to this website:

http://www.us-cert.gov/cas/tips/ and answer the following questions using the MLA format. Do not copy and paste!

  1. What is a social engineering attack? What is a phishing attack? How do you avoid being a victim?
  2. How do you know if your identity has been stolen and how do you avoid being a victim?
  3. Why can email attachments be dangerous? How can you protect yourself and others?
  4. What do firewalls do and what type of firewall is best?

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Your assignment is complete, if you have any queries shoot me a message and hang tight, I'll assist you in a couple minutes or asap. :-)Have a blessed day.

INSERT SURNAME HERE 1

Cyber Security
Institutional Affiliation
Date
Social engineering attack is when the person who performs the attack uses social skills to
get information about an institution or its computer systems. The attacker might appear as a
normal person working within the organization or temporarily hired by the organization
unknowingly and might even produce credentials to support his or her identity. Though by
asking questions from a single or multiple sources, the attacker might piece together information
he or she needs to get into an organization’s network (Irani 55-74).
A phishing attack is like a form of social engineering attack though the person making
the attack does not use social skills; rather he or she uses harmful websites or an individual’s
email to get personal data from the victim by pretending to be a trustworthy organization. An
example is when the attacker sends an email from a well-known credit company or financial
institution requesting for the victim’s bank account information, often suggesting the account has
some issues that need verification. When the unsuspecting users reply with this information,
attackers use this to access the accounts. These attackers may also take advantage of certain
calamities such as hurricanes by posing as charities to extort unsuspecting victims (Irani 55-74).
These are some of the ways one avoids being a victim of either social engineering attack
or phishing attack. One should always be suspicious of random visits, phone calls or emails
asking about other employees or an organization’s internal info. In case a stranger claims to be
from a certain organization, one should first try to contact the said organization so as to confirm

INSERT SURNAME HERE 2

if the person is legitimate or not. Another way is one should never provide information of any
kind whether personal or the organization’s information to any person unless you are completely
sure one has the relevant authority to access the said information. Also one shou...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags