UOP CMGT245 Week 4 Discussion
CMGT245 IS Security Concepts
Week 4 Discussion
DQ1 Authenticate, Authorize, and Access
Research identification and authorization, comparing and contrasting their strengths and weaknesses.
Describe the reasons why an IT group might create role-related access limitations related to reading data, editing content, or executing certain programs on a server.
DQ2 Facing the Threat of Social Engineering
After reading a story on a popular website describing how a social engineer defrauded a business of four million dollars, an executive approaches you to discuss defending against social engineering tactics.
Explain how you would help the organization develop a strategy to defend against attacks from in-person interactions, through email, through social media, and by phone.
-
Rating:
/5
Solution: UOP CMGT245 Week 4 Discussion