Actions to minimize the threats of phishing scams.


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

Actions to minimize the threats of phishing scams.


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

GUIDELINES: Write a short paper (1 page per topic below (a – d) and double-spaced) addressing the concerns described below. Total text minimum is 4 pages and additionally, your references must be listed (use APA format). PROBLEM DESCRIPTION: You are an IT Security Analyst working in mid-size company (approximately 300 employees). With all the media hype on security breaches, you are concerned about the security of your data and minimizing the overall threat to your company. You currently run on a Microsoft AD environment and your company relies heavily on Email for communication with many business partners. At times, there are attachments sent within the Emails and you are concerned of malware that may enter and spread into your company. Also, your company uses Web applications and is currently looking into using ActiveX. OBJECTIVE: Using information from the first three chapters and some research, please explain in your report the action you would take if: a) You want to minimize the threats of phishing scams. What guidelines would you use to recognize them and other fraudulent Emails? b) You want to minimize the overall threat of malware entering your company. What steps can you take? c) You’ve heard of current attacks against Web clients such as clickjacking and HTTP injections. What does your research reveal about these attacks? d) You’ve heard of ActiveX. What are some details you can include in this report on ActiveX regarding vulnerabilities and security issues?