Chapter 2
- Define well-meaning insiders and describe how security technology can support them.
A well-meaning insider is someone who is trying to perform their job function but could make a mistake that exposes the organization to risk. Technology can be used to ensure that any mistakes they make do not cause irreparable harm to the organization. (Section: The three types of insider threats)
- Describe some common social engineering techniques in your own words. Which is the most common?
The types of social engineering techniques covered in the chapter were phishing, spear phishing, baiting, scareware, tailgating, shoulder surfing, and pretexting. Phishing is the most common. (Section: People exploiting people)
- Describe some types of malicious software in your own words.
The types of malicious software covered in the chapter were viruses, worms, trojans, ransomware, and spyware. (Section: People exploiting people)
- What does lateral movement...