Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

llèr should document the mistake and work around the problem. The examiner shoul

ID: 3857379 • Letter: L

Question

llèr should document the mistake and work around the problem. The examiner should attempt to hide the mistake during the examination. B. C. D. The examiner should verify the tools before, during, and after an examination. e examiner should disclose the mistake and assess another area of the disc. Case Studies for Chapter 16 1 The case studies in this chapter offer generic scenarios for you to read through and answer accord. ing to your own technology and experiences. There are example solutions in a PDF on the DVD. Your solutions might vary, but both can certainly be valid. Many case study solutions also point to hands-on videos and simulations, which can be found on the DVD. Case Study 16-1: Identifying Social Engineering Attacks Scenario: As an IT professional, you realize that your job spans much more than just computers. For instance, it deals with the intangible world of social engineering. You have recently taken over the position of security administrator for a company with 200 users, but prior to your new appoint- there was little if any security. You are concerned with people that were previously allowed ment access to the building and how those people might try to infiltrate your company in the future through social engineering techniques. Conduct research on the Internet and give one example each of pretexting, hoaxes, and malicious insiders. Then, define ways that you would protect your company, data, and employees from these social engineering methods.

Explanation / Answer

On of the most IT Cyber attack has been happened recently around the world.

We have recently seen or heard of cyber attack all over the world. Wann cry, ransomeware,and all. These malicious programs(or viruses) come into our system,personal computer and any electronic deivice and steal our data or lock our computer for money until we pay the certian amount of money. It locks the computer until we pay the cetain amount of money(ransome). This is what cyber attack in the form of malicious programs or mailicious insiders. This has to be identifed and protected our systems from these types of cyber attacks.

Now coming to the projection to the company or oranization i work for:

First of all, i would say, where there is a data or huge amount of data, there is a high possibity of cyber attacks in the form of viruses(programs),stealing of data, destroying the content,dential of services(downing the servers). So we mainly should focus on how we protect data as well as how we give protects to our organization using different types of security methods availble in today's IT.

Being a securty admin, i should aware of all the possiblity of protecting organization data as well 200 users data. Employee or user works in organization. Hence providing security to organization implies providing security to 200 users. I use my experince for the organization i work for.

First of all, i will dividing the number building into blocks and i give or differentiate each of the build with block and then i arrang or give particular IP address for each block so that i can identify which IP address has been used and where it has been used(which block). However, 200 user should have access to all. So each block have all the access to with other blocks as well. Then Coming to the servers. There should be one or more servers for the organisation, i work on the physical servers and i will try to enchance its working speed and provide different types of security to server so that it cant be hacked or slower the of its working. Mean while, i should have moniter or catalog systems to moniter the entire 200 user acitivites or any incoming from the outside the oragnization. each user will have different types of security access to organization. I will intimate or mail to all the employees for security alerts and data protection ways on regular basis.i will make sure that systems(user use computers) are virus free and fully protected with anti virus softwares. I will provide awareness to the all the user on the security threats, cyber attacks and all so that each and every user in the organization will have a basic idea on these threats.