1. What is social engineering? How do you protect against social engineering activities?
2. What is business continuity? Provide an example of a business continuity plan.
3. What are the three types of access control policies used in organizations?
1. Reflect on your personal actions and activities that compromise information security. What are some ways to correct these actions?
2. Identify an upcoming mega event. What security issues do you foresee? How can these issues be addressed?