Reference no: EM132088940
1 Discussion Question
Your boss mentions that recently a number of employees have received calls from individuals who didn't identify themselves and asked a lot of questions about the company and its computer infrastructure.
At first, he thought this was just a computer vendor who was trying to sell your company some new product, but no vendor has approached the company.
He also says several strange e-mails requesting personal information have been sent to employees, and quite a few people have been seen searching your company's trash dumpsters for recyclable containers.
Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done about the various incidents.
2 Discussion Question
Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented.
3 Discussion Question
Discuss the importance of user technology security education within organizations. What topics should be included in security education and training?
4 Discussion Question
Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well?
5 Discussion Question
Discuss one of the most important things you will take from this course. You do not have to document your sources for this question. It is an opinion question.
Identify the security and privacy controls
: A large percentage of healthcare providers that might qualify for these financial incentives are small practices-essentially small businesses.
|
What is boomer tax basis in the sooner stock
: This year, Sooner Company reports current E&P of negative $320,000. Its accumulated E&P at the beginning of the year was $280,000.
|
How transactions affecting stockholders equity
: During the year, the following selected transactions affecting stockholders' equity occurred for Navajo Corporation: Feb. 1 Repurchased 260 shares.
|
Determine the number of sabres to be sold to break-even
: Yoda owns and operates "The Force Company" a light sabre producing company. He is considering the introduction of a new custom light sabre that he estimates.
|
Discuss the use of cloud backup strategies
: Discuss the importance of user technology security education within organizations. What topics should be included in security education and training?
|
What avenues do you think are available for current players
: Over the years a number of formerly fragmented industries have gone through a rapid period of consolidation that changed the dynamics of the industry.
|
What effect do items have on individual tax return
: During the year, Wheel, a calendar year S corporation in Stillwater, Oklahoma, generates the following AMT items: a positive adjustment of $66,000
|
How does fiber optics enhance physical security tools
: How did fiber optics revolutionize the communication world? How cost effective is fiber optics? How does fiber optics enhance physical security tools?
|
What agi would jack report under the circumstances
: Suppose that Jack also reported income of $11,300 from a half share of profits from a partnership. Disregard any potential self-employment taxes on this income.
|