Assignment: Complex Technology
April 19, 2022
Assignment: Malicious Code Pointing
April 19, 2022

Assignment: Phishing Emails

Assignment: Phishing Emails

Assignment: Phishing Emails
ORDER NOW FOR ORIGINAL AN ORIGINAL PAPER ASSIGNMENT: Assignment: Phishing Emails
Assignment: Phishing Emails

Can estimate the extent of the breach

• Hackers can conceal their IP address

• Hackers can delete logs • Logs can be huge • Irregular inspections

System alerts

High • Can help point to logs • Can detect an attack in

process • High sensitivity

• Low selectivity

© 2016 John Wi ley & Sons, Inc. 18
Storage and Transmission Tools (continued)

Tool Ubiquity Advantages Disadvantages

Encryption Very high • Difficult to access a file without the key

• Long keys could take years to break

• Keys are unnecessary if password is known

• If the key is not strong, hackers could uncover it by trial and error

WEP/WPA Very high • Same as encryption • Most devices have the

capability • Provides secure wifi

connection

• Same as encryption • Some older devices have limited

protections • WEP is not secure, yet it is still

provided

VPN Medium • Trusted connection is as if you were connected on site

• Hard to decrypt

• Device could be stolen while connected

• Sometimes slows the connection

© 2016 John Wi ley & Sons, Inc. 19
Security Policies

• Perform security updates promptly

• Separate unrelated networks

• Keep passwords secret

• Manage mobile devices (BYOD)

• Formulate data policies (retention and disposal)

• Manage social media (rules as to what can be shared, how to identify yourself)

• Use consultants (Managed Security Services Providers)

© 2016 John Wi ley & Sons, Inc. 20

SETA (Security Education, Training, and Awareness)

• Training on access tools • Limitations of passwords • Formulating a password • Changing passwords periodically • Using multi-factor authentication • Using password managers

© 2016 John Wi ley & Sons, Inc. 21
SETA (Security Education, Training, and Awareness)

• BYOD • Rules • How to follow them

• Social Media • Rules • How to follow them • Cases from the past that created problems

© 2016 John Wi ley & Sons, Inc. 22
SETA (Security Education, Training, and Awareness)

• Vigilance: Recognizing: • Bogus warning messages • Phishing emails • Physical intrusions • Ports and access channels to examine

© 2016 John Wi ley & Sons, Inc. 23
Classic Signs of Phishing

• Account is being closed

• Email in-box is full

• Winning a contest or lottery

• Inheritance or commission to handle funds

• Product delivery failed

• Odd URL when hovering

• Familiar name but strange email address

• Poor grammar/spelling

• Impossibly low prices

• Attachment with EXE, ZIP, or BAT (etc.)

© 2016 John Wi ley & Sons, Inc. 24
Managing and Using Information Systems:

A Strategic Approach – Sixth Edition

Keri Pearlson, Carol Saunders, and Dennis Galletta

© Copyright 2016 John Wiley & Sons, Inc.

You must proofread your paper. But do not strictly rely on your computer’s spell-checker and grammar-checker; failure to do so indicates a lack of effort on your part and you can expect your grade to suffer accordingly. Papers with numerous misspelled words and grammatical mistakes will be penalized. Read over your paper – in silence and then aloud – before handing it in and make corrections as necessary. Often it is advantageous to have a friend proofread your paper for obvious errors. Handwritten corrections are preferable to uncorrected mistakes.

Use a standard 10 to 12 point (10 to 12 characters per inch) typeface. Smaller or compressed type and papers with small margins or single-spacing are hard to read. It is better to let your essay run over the recommended number of pages than to try to compress it into fewer pages.

Likewise, large type, large margins, large indentations, triple-spacing, increased leading (space between lines), increased kerning (space between letters), and any other such attempts at “padding” to increase the length of a paper are unacceptable, wasteful of trees, and will not fool your professor.

The paper must be neatly formatted, double-spaced with a one-inch margin on the top, bottom, and sides of each page. When submitting hard copy, be sure to use white paper and print out using dark ink. If it is hard to read your essay, it will also be hard to follow your argument.