There are many ways that people can be manipulated to disclose knowledge that can be used to jeopardize security. One of these ways is to call someone under the false pretense of being from the IT department. This is an example of:
Blog
True or False? C-level executives, such as CIOs and CEOs, ar…
True or False? C-level executives, such as CIOs and CEOs, are often the target of social engineering.
True or False? A security awareness policy should inform wor…
True or False? A security awareness policy should inform workers of how to deal with unexpected risk.
True or False? Hacking is attractive because of the ease wit…
True or False? Hacking is attractive because of the ease with which data can be obtained compared with social engineering.
True or False? A best practice is to require all users who a…
True or False? A best practice is to require all users who access information to use unique credentials that identify who they are.
Imagine a scenario in which an employee feels compelled by m…
Imagine a scenario in which an employee feels compelled by management to regularly shirk the organization’s established security policies in favor of convenience. What does this employee’s continued violation suggest about the culture of risk management in the organization?
True or False? System accounts often need elevated privilege…
True or False? System accounts often need elevated privileges to start, stop, and manage system services.
True or False? A privileged-level access agreement (PAA) is…
True or False? A privileged-level access agreement (PAA) is designed to heighten the awareness and accountability of users who have administrative rights.
True or False? Control partner network access should be high…
True or False? Control partner network access should be highly prohibiting, allowing access to specific functions.
A company recently purchased a sizeable amount of equipment…
A company recently purchased a sizeable amount of equipment for its manufacturing process. It needs to properly report these expenditures so the financial statements are accurate. It calls upon the services of financial auditors. While financial auditors might consider the completeness of the data, the company might also involve IT auditors to examine the underlying technology that captures, records, and calculates the financial results. What process is this company using to address its concerns?