Describe ‘social engineering’ from an I.S. security perspective.
• Question 1: Describe ‘social engineering’ from an I.S. security perspective. Provide two examples of social engineering and two safeguards to prevent these examples. (~250 Words)
• Insert your answer here and remove this comment.
• Question 2: Define ‘alien software’. Explain how it differs from viruses, worms and trojan horses. Give 4 examples of alien software and explain how they work. (~250 Words)
• Insert your answer here and remove this comment.
• Question 3: Define the difference between ‘unintentional’ and ‘deliberate’ threats to information systems. Provide 4 examples of deliberate threats and explain how they work. (~250 Words)
• Insert your answer here and remove this comment.
• Question 4: Define ‘asymmetric encryption’ from an I.S. perspective. Discuss the relationship between encryption, certificate authorities and digital certificates. (~250 Words)
