Reference no: EM13775082
There have been many studies conducted on the relative weakness of security products, components and mechanisms. In the majority of cases the major weakness has been identified as the actual users of the system. Whether they are the attacker or the attacked users have the greatest capacity to compromise a system by using, or providing information to hackers, in a way that is damaging. Much time as an IT Security professional is spent on developing, implementation and managing technical controls without much more than a passing interest paid to the people that use the technology every day.
For this assessment task you will write an essay on the following:
Social Engineering: Protecting Systems from Users
Some primary ideas you might like to address in this essay include:
Definition of Social Engineering.
How does Social Engineering allow hackers to gain access to systems or escalate privileges?
What are the key challenges of combating Social Engineering Attacks?
What mechanisms, techniques or tools can be used to mitigate against Social Engineering Attacks?
IMPORTANT!!! Please refer to the Marking Criteria and Rubric:
Marking Criteria:
Introduction
The introduction sets the scene for the whole essay. The purpose of the introduction is to identify the topic, your point of view and the main reasons for your response. Generally approximately 10-15% of the allocated word count.
This section will often contain the following points:
• Introduce the topic.
• Give background or context to give relevance to the discussion.
• State the main point or purpose of the essay.
• Preview the subtopics or themes.
Body
Paragraphs in the body of the essay show your discussion of the main ideas supporting your position or response to the question. Ideas from the scholarly literature give credibility and weight to your argument. Generally approximately 70-80% of the allocated word count.
Each paragraph should link with the previous paragraph and may include:
• A topic sentence: a statement of the main idea of the paragraph.
• Explanation or supporting evidence from the scholarly readings.
• Further evidence from your reading to deepen your discussion.
• Application of ideas to a scenario or through the use of an example.
• Your discussion of, comment on and evaluation of these ideas.
• A concluding sentence that brings the paragraph to a close.
Conclusion
The purpose of the conclusion is to summarise and make final evaluative comments. It is important to refer back to the essay questions. Generally approximately 10-15% of the allocated word count.
This paragraph includes:
• A brief summary of the main ideas presented in the essay.
• Confirmation of any thesis included in the introduction.
• Final evaluative comments on the relative importance of the arguments.
• Comments on the ongoing significance of the topic as an issue that needs further discussion or investigation.
• DO NOT introduce any new content at this point.
Presentation
• Grammar & spelling
• Essay format
• Overall presentation
• Appropriate referencing using APA 6th Edition.
• Reference list should contain a minimum of 6 appropriate references.
Nonmonetary exchange and dispositions of property-equipment
: Looking at the footnote disclosures of the company, what are the individual components of property and equipment? For example, what are the amounts for land, building, equipment, accumulated depreciation, and so forth? How do companies account for no..
|
Ece curriculum directions reflection
: Jaruszewicz (2013) outlined the historical transformation of curriculum and, from this outline, you will notice that the United States continues, like all societies, to refine beliefs about best practices in education and oftentimes these topics g..
|
Integrating culture and diversity in decision making
: Choose one (1) of the following organizations to research: Google, Zappos, Southwest, Hewlett Packard, Xerox, W.L. Gore, DuPont, or Procter & Gamble. Use a variety of resources (company Website, newspaper, company blogs, etc.) to research the cult..
|
How do intangible assets differ from property and equipment
: Does the company have intangible assets? If so, what are the types of intangible assets (patent, copyrights, etc.) and their amounts? What is the amount of amortization expense? What amounts on the most recent cash flow statement relate to the purcha..
|
Definition of social engineering
: There have been many studies conducted on the relative weakness of security products, components and mechanisms. In the majority of cases the major weakness has been identified as the actual users of the system.
|
Purchases and sale of property of equipment
: What is the amount of property and equipment on the balance sheet for the two most recent years? What is the amount of depreciation expense? What amounts are on the cash flow statement for the most recent year that relate to depreciation, gains and s..
|
Describe the methodological approach
: Describe the methodological approach you would use. Explain why you selected your preferred approach.
|
Describe the boundaries the media should adhere
: From the first e-Activity article, discuss whether you agree or disagree with the article's premise that the media portrays women as sexual objects. Describe the boundaries you think that the media should adhere to when it comes to issues of sexualit..
|
Amount of cooked insects and rodent parts
: Assume your readers know the facts of the case and are only seeking your opinions on the amount of cooked insects and rodent parts you are willing to have in your butter.
|