Social Engineering

Descripción

(Chapter 10 - Security) Cisco IIT essentials Mapa Mental sobre Social Engineering, creado por groche el 14/02/2014.
groche
Mapa Mental por groche, actualizado hace más de 1 año
groche
Creado por groche hace más de 10 años
46
0

Resumen del Recurso

Social Engineering
  1. an attacker pretends to be an IT technician and asks for your username and password
    1. A social engineer can pretend to be a technician coming to repair something in a company but look for usernames and passwords
      1. precautions to help protect against social engineering
        1. Never give out your password
          1. Always ask for the ID of unknown people
            1. Restrict access to visitors
              1. Escort all visitors
                1. Never post your password in your work area
                  1. Lock your computer when you leave your desk
                    1. Do not let anyone follow you through a door that requires an access card
                    Mostrar resumen completo Ocultar resumen completo

                    Similar

                    Encryption (coding data to make them more secure)
                    groche
                    Cyber Crime and Social Engineering
                    Laiyla ♡
                    Quiz chapter 3 - Raheem
                    groche
                    Network Security Vocabulary
                    Shantal K Green
                    Quiz chapter 1 - Raheem
                    groche
                    The IT Professional
                    groche
                    Communication Skills and the IT Professional
                    groche
                    Audio and video editing workstations
                    groche
                    Open the case and install the power supply
                    groche
                    quiz chapter 12
                    groche
                    Cases and power supplies
                    groche