You have been asked to help secure the information system and users against hacking attempts. Complete the following:
- Take this opportunity to describe the 4 different approaches and techniques a hacker would use to steal the organization’s data.
- For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.
- Include 2–3 pages of material covering the 3 discussion areas in Section 5 of your Key Assignment document (including the completed previous 4 sections).
- social engineering,dumpster diving,identify theft,cyberterrorist