There are many ways to gain access to others' devices and digital information. Some practices are known to information security experts as "social engineering." Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. (Source: Wikipedia)
For example: A person may ask to insert a USB into your device, or send an email to download a file to your device. Performing these tasks can insert malware that can do all sorts of harm.
This sort of thing can even happen to adult professionals in the information business; read THIS ARTICLE for a recent example. (Thanks, BoingBoing!)
- Home
- Member Blogs
- The Socratic Method
- Richard Cory
- Conscience of a Hacker
- Literature Analysis (Fiction)
- The Earth on Turtle's Back
- The Right to Your Opinion
- "I never learned to read!"
- KNOW YOUR RIGHTS
- What's Your Big Question?
- Young Goodman Brown
- Two Dogs & the Nature of Story
- Résumé Template
- Dream Within a Dream
- The Art of Hosting Good Conversations Online
- On Self-Reliance
- The Pedestrian
- The Great Gatsby
- Brave New World
- SPRING TERM PAPER
- SPRING FINALS SCHEDULE
Subscribe to:
Post Comments (Atom)
thank you
As often as I say it, I feel like I don't say it often enough: Thank You. Thank you for your effort, your insight, your willingness...
-
JOURNAL TOPIC: Think of a person who is important in your life. What if you realized this afternoon that you would never get to see or co...
-
JOURNAL TOPIC: Why do you feel tired so often? Since I assume most people know how to address being tired (sleep, rest, reduce stress, ea...
-
The time is now! Please choose a fiction book (a.k.a. a novel) that you would like to read for your first literature analysis. Please com...
No comments:
Post a Comment