Showing posts with label social engineering. Show all posts
Showing posts with label social engineering. Show all posts

Monday, October 5, 2020

Post #6 – Network Security [CLO: 6]

 You initially completed this post in your Network Security assignment in Week Four. Review the instructions here and incorporate the instructor feedback from the Week Four assignment in your sixth blog post.

To complete this assignment, you must research at least two credible or scholarly resources in addition to your course text.

You will be including revised content from this assignment as Post six of your Information Technology Blog Final Project. You may wish to review the instructions included for the Information Technology Blog in Week 5 prior to completing work on this assignment to see how it fits into your overall final project.

To complete this assignment, you will explain the importance of information and system security for individuals and organizations.

As a part of the Week 3 Traveling Through a Network assignment, you used ping commands to become familiar with networking. Explain the type of attack(s) that can be executed using ping commands.

In addition, select two of the following computer security incidents to discuss in more detail:

  • Security holes/vulnerabilities
  • Computer viruses
  • Email spam
  • Phishing
  • Password cracking
  • Social engineering

In your paper

  • Explain why computer systems are vulnerable to each kind of threat.
  • Describe the symptoms and damage that each breach can inflict after compromising a system.
  • Propose at least two recommendations for protecting a computer system or network from each type of security breach.
  • Support your statements with evidence from your sources.

Schoolwork assignments incoming

These first few posts are part of this assignment:  "Throughout this course, you will create an Information Technology Blog with seven ...