Social Engineering and Malware
Today we examine the different types of security threats that exist and we begin our discussion with Social Engineering, the art of manipulating people to gain information or access.
You’ll learn how people are the most common tool used to exploit a system and or access to information and the many ways in which this easily occurs. For example, you’ll learn the various ways program, applications, emails and other mediums are configured to deceive or trick people into doing something so that unauthorized access or exposure can be performed. And we’ll discuss strategies and techniques for identifying and minimizing these occurrences from happening.