Martinez_Assignment_#2

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

452

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by ProfResolveJay9

Report
Running head: ASSIGNMENT #2 1 Assignment #2 Wilkins Martinez Lopez American Military University System ISSC452 Professor Ahmad Salim
ASSIGNMENT #2 2 Assignment #2 Title: Understanding Threats to Information Security: A Non-Technical Overview Slide 1: Introduction Welcome and introduction. Briefly explain the importance of information security in our digital age. Highlight that this presentation is designed for those with minimal technical knowledge. Slide 2: What is Information Security? Define information security as the practice of protecting information from unauthorized access, disclosure, alteration, or destruction. Emphasize that it's about keeping our data safe from various threats. Slide 3: Types of Information Explain that information can come in many forms, such as personal data, financial information, and business secrets. Emphasize that all information is valuable and needs protection. Slide 4: Threats to Information Security Introduce common threats to information security: Malware (viruses, ransomware) Phishing Password attacks Social engineering Physical theft or loss of devices Explain that these threats can affect anyone, not just experts. Slide 5: Malware
ASSIGNMENT #2 3 Define malware as malicious software. Explain that it can infect computers and steal or damage information. Mention the importance of antivirus software. Slide 6: Phishing Explain phishing as tricking people into revealing sensitive information (e.g., passwords) through fake emails or websites. Highlight the importance of not clicking on suspicious links. Slide 7: Password Attacks Describe password attacks as attempts to guess or steal passwords. Stress the importance of strong, unique passwords. Slide 8: Social Engineering Explain social engineering as manipulating people into revealing information. Give examples like impersonation or pretending to be from a trusted organization. Emphasize the need to verify requests for sensitive information. Slide 9: Physical Threats Discuss physical threats like theft of devices (e.g., smartphones, laptops) containing sensitive data. Recommend locking devices when not in use. Slide 10: Protecting Your Information Provide practical tips for protecting information: Use strong, unique passwords. Be cautious with email links and attachments. Don't share sensitive information with unknown contacts.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help