There are many ways to gain access to others' devices and digital information. Some practices are known to information security experts as "social engineering." Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. (Source: Wikipedia)
For example: A person may ask to insert a USB into your device, or send an email to download a file to your device. Performing these tasks can insert malware that can do all sorts of harm.
This sort of thing can even happen to adult professionals in the information business; read THIS ARTICLE for a recent example. (Thanks, BoingBoing!)
- Home
- Conscience of a Hacker
- "I never learned to read!"
- Member Blogs
- Literature Analysis
- KNOW YOUR RIGHTS
- Richard Cory
- Big Questions
- What's Your Big Question?
- Résumé Template
- The Art of Hosting Good Conversations Online
- The Pedestrian
- A Sound of Thunder
- Lit Terms
- To Build a Fire
- Cat in the Hat
- The Monkey's Paw
- Story of an Hour
- Murders in the Rue Morgue
- The Gift of the Magi
- A Telephone Call
- The Tell-Tale Heart
- The Murders in the Rue Morgue
- The Most Dangerous Game
- SPRING TERM PAPER
- SPRING FINALS SCHEDULE
Subscribe to:
Post Comments (Atom)
thank you
As often as I say it, I feel like I don't say it often enough: Thank You. Thank you for your effort, your insight, your willingness...
-
Today we are janitors and we are creators. AGENDA: 1. Clean up after yourself. Think back on any assignments you missed, or any opport...
-
The time is now! Please choose a fiction book (a.k.a. a novel) that you would like to read for your first literature analysis. Please com...
-
There's an old saying: "Be careful what you wish for, because you just might get it." Huh? Why would I wish for somethin...
No comments:
Post a Comment