Question: IT 2 2 1 - 4 6 1 Individual Assignment# 1 Important notes: Answer the following two questions. Your answer should be genuine and based

IT221-461 Individual Assignment#1
Important notes:
Answer the following two questions.
Your answer should be genuine and based on your understanding.
Copy and paste from Web will be detected and punished.
You will be asked about your assignment in the class.
Do not share your solution with your classmates.
Submit your assignment before the deadline.
No excuses will be accepted
When you submit your assignment, you have to write a cover page contains your name, ID,
Subject code and name and Assignment no.
Use font Time new roman 12 for the text.
The format of the assignment is important and will be given marks.
Q1. Social Engineering Attacks:
Today's Attacks and Defenses at the beginning of chapter 2 illustrated how a security researcher
could manipulate a help desk support technician into compromising security.
If you were to create your own social engineering attack, what would it be?
Using your place of employment or school, first determine exactly what your goal would be in the
attack, and then craft a detailed description of how you would carry out the attack using only social
engineering to achieve your goal.
You might want to search the Internet for examples of previously successful attacks that used
social engineering.
Why do you think your attack would be successful?
Who would be involved?
What would be the problems in achieving your goal? Why?
Write a one-page paper on your research.
Q2. USB Device Encryption
Use the Internet to select four USB flash drives that support hardware encryption.
Create a table that compares all four and their features.
Be sure to include any unique features that the drives may have along with their costs.
Which would you recommend? Why?
Write a one-page paper on your research.
IT 2 2 1 - 4 6 1 Individual Assignment# 1

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!