Computer Science Homework Help

Jawaharlal Nehru Technological University Information Assurance Discussion

 

Information Assurance:

Describe three network security risks and how an administrator may be able to defend aganist them.

An initial post must be between 300-350 words 

Use at least three sources. Use the Research Databases available from the Danforth Library (https://libguides.nec.edu/az.php) not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.

Write in essay format not in bulleted, numbered or another list format.

Ethical Hacking:

A.Discussion:

write no less than 300 words, Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided?

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-artic…

B. Assignment:

write in 400 words

Conduct your own social engineering experiments.

1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.