1)Describe three network security risks and how an administrator may be able to defend aganist them.
2)What are some of the characteristics and operations of some of the malicious software that exists today?
3)Using the following link as your reference, select TWO and explain the differences(viruses, worms, trojans, and bots). What Is the Difference: Viruses, Worms, Trojans, and Bots?
4)Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation been avoided?
5)Conduct your own social engineering experiments.
1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?
Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.
Write your findings in either a list or in paragraph form.