COMM 226 Chapter Notes - Chapter 12: Email Spoofing, Social Insurance Number, Personal Information Protection And Electronic Documents Act
Document Summary
Q3) what type of security threats do organizations face: three sources of security threats are, human errors and mistakes. Fires, floods, hurricanes, earthquakes, tsunamis, avalanches, tornados, and other acts of nature. Occurs when someone devices by pretending to be someone else. Involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers: phishing. Is a similar technique for obtaining unauthorized data, and it uses pretexting via email: spoofing. Is another term for someone pretending to be someone else. Ip spoofing occurs when an intruder uses another site"s ip. Email spoofing is a synonym for phishing: sniffing. Balancing costs and benefits: safeguards, protections against security threats. Incident response: must plan for prior to incidents. Q4) how can technical safeguards protect against security threats: technical safeguards involve the hardware and software components of an information systems, identification and authentication.