Studyspark Study Document

Critical Information Literacy Essay

Pages:1 (280 words)

Sources:2

Subject:Crime

Topic:Cyber Crime

Document Type:Essay

Document:#59120688


Free Essay Sample

Cybercrime how to defend against social engineering

There are several attack vectors for cybercriminals, which means that people need to have an equal number or more of ways to defend these attacks. Social engineering is one tactic, and it works in part because the attackers essentially bypass formal defenses such as firewalls or antivirus. Instead, social engineering is “the art of exploiting the human flaws to achieve a malicious objective” (Breda, Barbosa & Morais, 2017). A typical social engineering attack would be a phishing scam, but others would include hackers tricking people into providing information, which is then used against them (Kaspersky, 2020).

Protecting personal information online where social engineering attacks are concerned means training people in how social engineering attacks work, what the attackers need you to do, and how to spot typical scams. This training can often be done with courses, or online, and many security providers offer these services.

Many social engineering attempts are seeking to gain passwords, so it is always valuable to use a password manager, where the actual password is encoded, or otherwise does not need to be typed in. With a password manager, this limits the risk of social engineering techniques like shoulder surfing.

Training is the most important line of defense in cybersecurity. The hard defenses like firewalls and antivirus protection can be bypassed by innovative attackers, but training against cyberattacks will limit their impact. By protecting passwords, using strong passwords, and using two-factor authentication it is possible to defend against social engineering cyberattacks, however they may come.

References

Breda, F., Barbosa, H., Morais, T. (2017) Social engineering and cyber security. Conference Paper.

Kaspersky (2020) What is social engineering? Kaspersky Labs. Retrieved April 15, 2020 from https://usa.kaspersky.com/resource-center/definitions/social-engineering


Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Communicating Professionally Critical Information Literacy

Pages: 1 (336 words) Subject: Communication Document: #25512283

CRITICAL INFORMATION LITERACY Critical Information Literacy: Communicating ProfessionallyCommunications in academic or professional arenas differ from communications taking place at a personal level. For example, personal communication could involve jokes, gossip, humor, and playfulness with close ones, while communication with professionals includes a straightforward tone without comic relevance. A formal tone and word structure are chosen to be plain and serious in conversations.Understanding the audience in personal and business communication is

Studyspark Study Document

Critical Information Literacy Technology in Nursing

Pages: 5 (1602 words) Sources: 5 Subject: Information Technology Document: #18587650

Technology in NursingIntroductionI possess a caring nature, and the decision to pursue a career in nursing was informed predominantly by the suitability of this characteristic in the nursing profession. While my caring nature was the fundamental drive for the pursuit of a career in nursing, other elements that contributed to this decision were the nature of the work and the perks that come with being a nurse. For example, the

Studyspark Study Document

Literacy Information Literacy As the

Pages: 3 (1453 words) Sources: 1+ Subject: Teaching Document: #14704953

While Lauer and Yodanis (2008) point out that the weblog has many applications, such as a journal or other means or personal use, they state that it can be used as a tool for students to collaborate with each other and share their learning, in addition to a tool for research where students can record their notes, thoughts, and links to more source material. Furthermore, the authors suggest that

Studyspark Study Document

Information Literacy and the Significance of Research

Pages: 2 (622 words) Sources: 2 Subject: Media Document: #14355140

In an information age, developing discernment and discrimination when digesting sources of information is a critical skill. Information literacy is the critical skill of being able to recognize credible sources and become a critical consumer of data. As Head & Wihbey (2014) point out, “finding useful information and a sense of what to trust” are now considered essential job skills (p. 1). Therefore, information literacy needs to be approached in

Studyspark Study Document

Information Literacy in Education and Its Influence on the Scholarship Practice and Leadership...

Pages: 3 (1088 words) Sources: 4 Subject: Teaching Document: #80613660

Literacy in Education: Its Influence on Scholarship, Practice and Leadership It was said of Thomas Jefferson that he knew almost everything there was to know. Life was simpler 250 years ago, and the world was smaller. There were only a fraction of the books that there are today, which was not a great problem since most people could not read. For today's learner, however, there is an infinite amount of

Studyspark Study Document

Design Training Programs Based on Appropriate Learning Principles and Theories Information Literacy Instruction...

Pages: 3 (886 words) Subject: Teaching Document: #3703807

ILI Information literacy instruction (I LI) is the process of instructing people how to use information resources in order to effectively search for and retrieve information. Thus, librarians have been teachers and instructors for many years. ILI can be most effective if the teacher (librarian) engages in the most efficient means of instruction. This method of instruction is most effective if it includes empirically validated the learning principles, active learning techniques,

Join thousands of other students and

"spark your studies".