Protecting Against Social Engineering (2 marks)
Discuss two methods that individuals or organisations can implement to protect against social engineering attacks.
Protecting Against Social Engineering (2 marks) Read More »
Discuss two methods that individuals or organisations can implement to protect against social engineering attacks.
Protecting Against Social Engineering (2 marks) Read More »
Explain the term ‘blagging’ as a form of social engineering.
Blagging (Pretexting) (1 Mark) Read More »
Describe the method by which social engineering can be used to compromise computer security.
Social Engineering Methodology (2 marks) Read More »
Explain the difference between white-box and black-box penetration testing.
White-box and Black-box Penetration Testing (4 marks) Read More »
Define the term ‘social engineering’ in the context of computer security.
Define Social Engineering (1 mark) Read More »
Explain how weak and default passwords can pose a cyber security threat.
Weak Passwords. (2 marks) Read More »
Discuss two methods by which social engineering can be used to compromise computer security.
Social Engineering Methods (2 marks) Read More »
Describe the cyber security risks associated with misconfigured access rights. (3 marks)
Misconfigured Access Rights. (3 marks) Read More »
What is penetration testing and why is it important?
The Importance of Penetration Testing (3 marks) Read More »