William Fisher
University of Maryland University College
CSEC610 Cyberspace and Cybersecurity
Professor Hall
Abstract
Evaluating the vulnerabilities of an organization’s information security starts with the risk assessment. The process includes the method performed and current protocols to both measure the risk involved and address attacks. Typically, businesses will have a network tailored to their particular needs balancing cost and need. All the technological tools commercially available can build a commanding network that contains the latest hardware and the most sophisticated software; however, those systems have but one unpredictable fault, the human factor. This paper …show more content…
A well-planned and assembled platform can be the key to current success and future growth. The network is a careful balance of digital needs and innovative technology ultimately forming the foundation that is a business’s telecommunication architecture. Social engineering is the technique of manipulating individuals, so they inadvertently undermine personal or corporate network security. Social engineering has become increasingly popular among criminals based upon human vulnerability exploitation. It is easier to take advantage of people’s natural tendency to trust rather than traditional hacking methodologies to gain access to the system or information sought …show more content…
In particular, their training should incorporate terminal learning objectives that include identifying deceptive patterns and suspicious forms of socially engineered attacks. Additionally, managers should individually receive training towards a skill set that nurtures reducing the stress in the work environment. Managers may sabotage their efforts and be subject to push back from employees who regard network security compliance and hindering both job performance. For example, the company should allocate both time and resources for to satisfy any requirements of information security compliance (“Unintentional Insider Threats: Social Engineering,"