Which of the following is a good way to prevent cybercrime called social engineering that is used to obtain necessary information about our computer system and network for use by criminals?

Law E-commerce 402

QUESTION 2

What can we do to minimize the potential for cybercrime of phishing emails in our company?

O 2. We can train our employees on the likely characteristics of phishing emails so they can recognize them and

O 1. We can depend entirely on our spam filters to eliminate all phishing emails and need to do no more.

immediately delete them and report them to our computer system and network personnel.

O 3. We can prevent all attachments in all emails from being opened by employees under any circumstances.

O 4. We can just deal with any problems that arise once our employees are tricked into opening attachments with

malicious content or giving away access to their personal accounts.

QUESTION 1

Which of the following is a good way to prevent cybercrime called social engineering that is used to obtain necessary information about our computer system and network for use by criminals?

O 1. There is no practical way to prevent social engineering as we want employees to be free to speak to anyone on the phone or via email who inquires about our computer system and network.

O 2. We can make all employees of our company ignorant of the particulars of our computer system and network so they cannot disclose this information to anyone.

O 3. We can train employees to never, under any circumstances, disclose sensitive information about our computer system or network to anyone.

O 4. We can train employees not always verify who is inquiring about potentially sensitive information about our computer systema and network in our company before disclosing such information.

Two multiple questions, which of these questions is the answer?

Reference the book

Davidson, A. (2009). The law of electronic commerce(1st ed.). Port Melbourne, Vic.: Cambridge University Press. ISBN-13: 978-0521678650

Alghamdi, A. (2011). The law of e-commerce: e-contracts, e-business. AuthorHouseUK. ISBN-13: 978-1467886031

 

Which of the following is a good way to prevent cybercrime called social engineering that is used to obtain necessary information about our computer system and network for use by criminals?
Scroll to top