Immersion in a Landfill Is Not Legal Essay Example
Immersion in a Landfill Is Not Legal Essay Example

Immersion in a Landfill Is Not Legal Essay Example

Available Only on StudyHippo
  • Pages: 2 (477 words)
  • Published: June 14, 2022
View Entire Sample
Text preview

In consideration of mode/details of the incidents happened, this is a variant of a particular social engineering attack called phishing and a fraudulent practice called as dumpster diving. As mentioned by M. Kawakami, H.

Yasuda and R. Sasaki, ' 'phishing' can be social/technical engineering attempt to trigger the leakage of sensitive information by creation of sense of urgency and credible situations'. The other attempt can be deemed as ' 'dumpster diving', an illegal practice by internal/external individuals accessing and sewing bits and pieces of sensitive information leading to a formidable data breach' as referred by K. Y.

Abeywardana, E. Pfluegel and M. J. Tunnicliffe. Both of them have a success rate of anywhere between 20 - 30 % and it varies depending on knowledge of the individuals on the company compliance policies and simple acts of securing the information.

These are some

...

ways we can make sure the current situation be reverted and make sure proper steps are taken care for the future happenings:

  • Dumpster containers should be locked, and proper compliance should be followed for recycling.
  • All the miscellaneous office documents no longer in use should be shredded before trashed.
  • The employees should beware of messages that create a tremendous sense of urgency may be trying to rush into making a mistake.
  • Official organizations don't usually send messages that are full of grammatical errors and spelling mistakes.
  • No legitimate organization should request highly sensitive information over email such as your credit card number or account password.
  • cyber attackers can send emails that look like they come from boss, co worker, or friend in order to gain the trust.
  • Information breach details have to be informed to
View entire sample
Join StudyHippo to see entire essay

the Security Team as soon as possible so that they can take the necessary steps as per the compliance policies. This might involve talking to the employees who have been victims to these scam calls/emails

  • Regular awareness communication from security team/higher officials describing the type, mode and social engineering terms used to trick the inside employees.
  • Regular training/counseling/email ; telephonic simulations and educating the employees not to give any personal and company sensitive data like company contract numbers, employee ID's, full names, DOB, SSN and most importantly combination of any of the above.
  • Random Quizzes to train employees on types of attacks with giveaways
  • Enforcement of outlook add-ons like 'Microsoft Report Message Add-In' & 'Microsoft Junk Message Add-In' to forward the emails to the appropriate Information Security Administrator
  • Laptop cam covers should be provided to all the employees.
  • Password change policy need to be enforced to all the Active Directory ID's in the company domain following specific, strict and complex password requirements.
  • All the systems should use the multi-factor authentication like DUO (Enterprise), RSA Secure ID (Enterprise) and Google Authenticator (personal) making it hard to crack for the scammers with trail and error or the exact password.
  • Get an explanation on any task
    Get unstuck with the help of our AI assistant in seconds
    New