null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
549750
Social Engineering
Description
Cisco IIT essentials (Chapter 10 - Security) Mind Map on Social Engineering, created by groche on 14/02/2014.
No tags specified
chapter 10 - security
cisco iit essentials
cisco iit essentials
chapter 10 - security
Mind Map by
groche
, updated more than 1 year ago
More
Less
Created by
groche
over 10 years ago
46
0
0
Resource summary
Social Engineering
an attacker pretends to be an IT technician and asks for your username and password
A social engineer can pretend to be a technician coming to repair something in a company but look for usernames and passwords
precautions to help protect against social engineering
Never give out your password
Always ask for the ID of unknown people
Restrict access to visitors
Escort all visitors
Never post your password in your work area
Lock your computer when you leave your desk
Do not let anyone follow you through a door that requires an access card
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Encryption (coding data to make them more secure)
groche
Cyber Crime and Social Engineering
Laiyla ♡
Quiz chapter 3 - Raheem
groche
Network Security Vocabulary
Shantal K Green
Quiz chapter 1 - Raheem
groche
The IT Professional
groche
Communication Skills and the IT Professional
groche
Audio and video editing workstations
groche
Open the case and install the power supply
groche
quiz chapter 12
groche
Cases and power supplies
groche
Browse Library