Question: To understand how to manage network security, you first need to know how to recognize threat that your network could suffer. Not all security breaches

To understand how to manage network security, you first need to know how to recognize threat that your network could suffer. Not all security breaches result from a manipulation of network technology, instead, some occur when staff members purposely or inadvertently reveal their passwords; others result from undeveloped security policies. The cause mentioned above, allow us to classify security risks with reference to people and one of the most common methods by which an intruder gains access to a network is to simply ask users for their passwords. For example, the intruder might pose as a technical support analyst who needs to know the password to troubleshoot a problem. This strategy is commonly called social engineering because it involves manipulating social relationships to gain access. A related practice is phishing, in which a person attempts to gain access or authentication information by posing as someone who needs that information. For example, a hacker might send an email asking you to submit your user ID and password to a Web site whose link is provided in the message and companies use security audit to prevent such misconduct. Based on the case provided, discuss what is a security audit and develop a plan/ an audit that companies can develop to mitigate such treats on their network.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!