Provide a constructive response to the paragraph

Assignment Help Computer Engineering
Reference no: EM133703830

Question: Provide a constructive response to the following paragraph. The type of reconnaissance technique I choose is searching open websites/domains specifically social media. The reason why I choose social media is a majority of people share their lives on social media networks and not many think about the potential consequences it has. For example a hacker could copy the CEOs social network page whether it be like a linked account or personal social media. By posing as the CEO I could potentially gain the trust of employees who have access to information like client payment information, banking and routing numbers. Data that I could potentially sell. Based on my research there is not a sure-fire way to mitigate this type of threat. It is important to have the proper training protocols in place and not overshare about yourself if you are high ranking in the company such as a CEO. The amount of personal information that is less accessible the better. Its harder to impersonate someone if you dont know much about them. In one of my other classes we had to do reconnaissance on a company and within a matter of minutes, I was able to find the CEOs name but not only that track down his family what colleges his kids went to. I figured I could go down a rabbit hole and create an entirely made-up facebook account. Unfortunately, the internet makes public figures so accessible.

Reference no: EM133703830

Questions Cloud

Evaluate methods and effectiveness of response systems : Evaluate methods and effectiveness of response systems for two DHS cases (choose two) from the following areas: border security, transportation security
Complaints of persistent headaches : O.M. is a 28-year-old male who works as a painter. He comes to see you for the first time in clinic today with complaints of persistent headaches.
Output from any statistical computer package : Each part requires an output from any statistical computer package (Excel). The statistical output must be provided. 2. Your report can be maximum
What are some potential risks of bending the rules : What are some potential risks of bending the rules or using discretion in street-level bureaucracy?
Provide a constructive response to the paragraph : Provide a constructive response to the paragraph. The type of reconnaissance technique I choose is searching open websites/domains specifically
Compare the prices and ratings of wines by wine type : Compare the prices and ratings of wines by wine type (red and white) by creating side-by-side boxplots. If the presence of outliers in the plots hinders
Conjunction therapeutic lifestyle : Patient education should always be provided in conjunction therapeutic lifestyle changes and pharmacotherapuetic interventions.
Create economic opportunity for young urban black : How would you characterize the Kennedy-era efforts to create economic opportunity for young urban Blacks? As having a structural emphasis?
Do they take into account needs of the public-common good : Do interest groups within a political party only seek to help themselves or do they take into account the needs of the public or "common good"?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd