Why does security depend on more than technologies?

What will be an ideal response?


To secure a software system, both technology and organization policies and personnel processes are needed. A system can have the most advanced technical protection, but it can still be compromised if the administrator is willing to give the needed information to an attacker. According to BBC news in a report published on April 2004 at the BBC Web site, 34% of respondents volunteered their computer system password when asked without even needing to be bribed. Another survey showed that, when questioned, 79% of people unwittingly gave away information that could be used to steal their identity. Social engineering attack is the practice of conning people into revealing sensitive data about a computer system, and these attacks can render any type of security measures useless. Most of the attacks are carried out by phone or in person; the attacker pretends to be an authorized user and can gain illicit access to a system. To reduce the risk of social engineering attacks, the technologies that provide security measures must be integrated into organizations' security policies and processes.

Computer Science & Information Technology

You might also like to view...

Which of the following methods is used to load a new picture into a picture box control?

(A) picBox.Picture = filespec (B) picBox.Image = filespec (C) picBox.Image = Image.FromFile(filespec) (D) picBox.Picture = LoadPicture(filespec)

Computer Science & Information Technology

____ usually require users to register by supplying a bit of personal information, choosing a user ID, and selecting a password.

A. Web apps B. Copyright terms C. Mobile apps D. Terms of use

Computer Science & Information Technology

____________________ effects add pattern and texture to a background.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

It is considered good practice to save a presentation before printing it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology