Question: Another social engineering example described in this chapter involved someone who called an ordinary employee (not an administrator) asking the employee to run a particular
Another social engineering example described in this chapter involved someone who called an ordinary employee (not an administrator) asking the employee to run a particular command. What steps could or should an ordinary employee take in such a situation? Because of their training, experience, and responsibilities, we might expect IT administrators to be more skeptical of social engineering attacks than ordinary employees. How could a company improve its ordinary employees reactions to social engineering attacks?
(Computer Security II)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
