Discussion- Security Operations
Style | APA |
Number of words | 319 |
Number of sources | 0 |
Spacing | Double |
PowerPoint slides | 0 |
Question
Discuss operational security, like Spear Phishing. Aimed specifically at high-level corporate users whose credentials could be used for high-level attacks. Typically comes from a user that you think you know. Discuss why the social engineering method works and how.
You must do the following:
1) As indicated above, please explain how DHS should handle the situation described in the preceding paragraph.