Business > CASE STUDY > Assignment 1.docx (2) ISSC 342 Week 1 Assignment Justin Schumann ISSC 342 Question 1 P (All)
Assignment 1.docx (2) ISSC 342 Week 1 Assignment Justin Schumann ISSC 342 Question 1 Phishing attacks, this is extremely important when it comes to making sure to double-check who is sending you ... emails. The primary way this type of threat works is by getting someone to lure one into doing something. For example, clicking on a link or attachment in an email. Opening attachments in emails can also install malware on users' devices that are designed to harvest sensitive information, send out emails to their contacts, or supply remote access to their devices. “Some of the keyways to spot a phishing email is to double-check the senders email address, this can help identify if the person is truly who they claim to be. Often, the criminal will use a public email address such as gmail.com or it will look like the official email address just with spelling mistakes.†(Pomeroy, 2020) Malware which includes Viruses, Worms etc. They may have different names but they have a similar purpose is to “conceal themselves inside the software that seem legitimate and when that software is executed they will do their task of either stealing information or any other purpose for which they are designed. They often supply backdoor gateway for malicious programs or malevolent users to enter your system and steal your valuable data without your knowledge and permissions.†(Garg 2020) These are the tools that are used by hackers to gain access to your machines and network. Question 2 The very fir. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 1 year ago
Preview 1 out of 2 pages
Instant download
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
Connected school, study & course
About the document
Uploaded On
Jul 23, 2022
Number of pages
2
Written in
This document has been written for:
Uploaded
Jul 23, 2022
Downloads
0
Views
23
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·