Chapter 14 Minicase

Chapter 14 Minicase - A clear end user policy gives the...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
1) What is meant by Social Engineering? Why does it occur so easily or frequently? What are specific examples of Social Engineering the were exploited in this case? Social Engineering is the technique to manipulate people to do certain things or divulge certain information. It occurs so frequently because people are trusting of people who present themselves as a higher authority. They were able to get the CEO’s password by talking with his secretary. 2) What is the value of having a clear end user policy (appropriate usage policy) for corporate information systems? What should it include? How should it be enforced? (can you think of any policies you would implement to enforce the terms?)
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: A clear end user policy gives the corporation the ability to protect the front lines of its network. The easiest way to get into a computer is through the end user’s mistakes. It should include how the computer should be used and what functions it should perform. 3) Name all of the individual security holes/breeches/violations that you found in the case. How many did you find? (Sure you found them ALL…) What specific measures are necessary to correct each one? 4) Why might it have been so easy to install spyware software in this case? It was so easy to install spyware software in this case because they had direct access to the networks servers...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online