CIS 100 University of Phoenix Wk 3 Social Engineering Discussion
Question Description
One of the hardest aspects of being a network administrator is to manage and limit threats to the physical network and the data that it contains.
Social engineering is one of the trickiest parts of the network security. It involves targeting people with convincing techniques to pry information from unsuspecting persons to compromise the network.
Whether it was shoulder surfing, phishing, tailgating or impersonation, many techniques have been proven quite successful in compromising data. Pick one social engineering technique (shoulder surfing, phishing, tailgating, impersonation) and explain how you would use that technique to pry information from an unsuspecting person.
"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."