LESSON 3-4 - Reviewer
LESSON 3-4 - Reviewer
8. Social Engineering
● Definition: Manipulating individuals into divulging confidential information.
● Examples: Phishing, pretexting, baiting, and tailgating.
10. SPAM
● Definition: Unsolicited commercial email.
● Threats:
○ Consumes bandwidth and CPU time.
○ Diverts IT resources from critical tasks.
○ Potential carrier of malicious code.
○ Techniques to mask the real source of spam.
19. Conclusion
● Importance of Understanding Threats: To develop effective
countermeasures.
● Implementing Best Practices: Firewalls, antivirus, strong passwords, and
intrusion detection systems are essential for defense.