Digital Identities Coursework Example
Words: 275
Pages: 1
13
13
DownloadCYBER SECURITY ATTACKS
By (Name)
Course
Professor’s Name
Institution
City and State
Date
Week 2
Questions
Most security experts recommend staff training to reduce the vulnerability of an organization to a social engineer attack, discuss the pros and cons of such an approach?
Pros
The training staff will increase the level of vigilance and awareness among staff. This will enable staff to know what they should do and not do during times of social engineering attacks. This is because staff will be aware of ways they may be attacked; hence this training increases the level of vigilance and knowhow on how to operate the software (Hansen and Nissenbaum, 2009, 22).
The training staff will enable users not to divulge information via phone or any other means of communication.
It allows the staff members to handle the matters regarding the online business on websites that use the https protocols.
It will prevent the vital information of the company from being divulged.
Cons
Some of the disadvantages of training staff on social engineering attacks are;
The training staff will stop all social engineering attacks. Hence this does not guarantee full security to the company itself.
The training might consume resources of the company and fail to improve the prevention of engineering attacks. This also might be labor intensive hence increased costs at it wastes much time of the company.
Training staff on social engineering attacks might give the company a false sense of security.
Conducting your own research, what other methods apart from training are effective in combating social engineering?
Always be aware of the information you are releasing.
Wait! Digital Identities Coursework Example paper is just an example!
This encompasses what you post on social media and the verbal communication.
Assets should be classified in terms of their vulnerability to criminals. Most companies invest in protecting what is not essential.
There should be a policy about social engineering attacks backed by proper training (Hansen and Nissenbaum, 2009, 20).
Employees should be given a sense of ownership when it comes to security.
The software should be kept up to date.
Reference
Hansen, L. and Nissenbaum, H., 2009. Digital disaster, cyber security, and the Copenhagen School. International studies quarterly, 53(4), pp.1155-1175.
Subscribe and get the full version of the document name
Use our writing tools and essay examples to get your paper started AND finished.