How well did you do on the test and what did you learn

Assignment Help Computer Engineering
Reference no: EM132239225

Question: One of the key topics we have been learning about is ensuring that all users are aware of security threats. Email phishing is a common threat that a user may face. Using email phishing tests are a very good way to train users. Now is your chance to try one for yourself. Take the email phishing test at the link below:

Once you have completed the test, write at least 1-page reflection on your experience. Be sure to follow APA format for your paper and don't forget to double-space your assignment. Answer the following questions in your paper:

1. How well did you do on the test and what did you learn?

2. How could you use this test to train employees about phishing?

3. What controls would you suggest to mitigate the risk of email phishing?

In this assignment, I am looking for your reflection on this assignment and how you will apply what you learned in your career. Your paper should be about what you learned and not a research paper about email phisihing.

This assignment will be checked for plagiarism using SafeAssign.

Reference no: EM132239225

Questions Cloud

Discuss about the remote access solutions : Discuss with your peers which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS).
How well does the video on the legislative section match up : How do the three branches of government, and outside forces, influence and interact on an important policy issue?
Give an example of each of the two strategies : Give an example of each of the two (2) strategies in current world politics and speculate on their effectiveness.
Propose how written and oral communication should be used : Assume you are a candidate for a director of communications for a major metropolitan county.
How well did you do on the test and what did you learn : One of the key topics we have been learning about is ensuring that all users are aware of security threats. Email phishing is a common threat that a user may.
How you do or could use operations security in current job : Describe how you do or could use operations security in your current job. Be sure to describe your job role (or desired job role). Your goal in completing.
The difference between a theocracy and western democracy : For this weeks discussion board please explain what is the difference between a Theocracy and Western Democracy?
Describe the fundamental security policies : Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2 types of industries.
How can statistical data be used to achieve the goal of hsem : Given the significance of politics and policy in homeland security emergency management, how can statistical data be used to achieve the goal of HSEM?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain how event handlers for controls are registered

Explain how event handlers for controls are registered. What is the purpose of the xml control? Why should form data validation be done on the server as client?

  How zyng soc can be used to accomplish a high-level design

List at least 3 advantage of implementing selected portions of a complex design in software. Explain how Zyng SoC can be used to accomplish a high-level design.

  Make an average class with a public data member

make an Average class with a public data member to collect the sum of the integer entries and a public data member to hold the double average of the sum of the 10 integers.

  Write a program named tests that declares five variables

Modify the Tests program to create a new one named TestsInteractive that accepts five test scores from a user.

  Create an application that produces three different outputs

Create an application that produces three different outputs using the same phrase. Select your own favorite popular saying for the phrase.

  E-commerce e-commerce term projectfor this assignment

e-commerce term projectfor this assignment assume that you are a consultant that has been hired to develop an e-

  Write a function named difference for the set class

Write a function named difference for the Set class that returns the difference between two sets. The function should return pointer to a new set that has item.

  Take movie of a location and a movie shot in front of screen

Take a movie of a location and a movie shot in front of a green screen and use chromakey to blend the two movies together.

  Calculate the number of possible color combinations

In the popular game Mastermind, one player creates a secret code of four pegs, each of which can be chosen from one of six colors.

  What is largest and smallest number that can be represented

What is the value n, the smallest number of bits needed to represent all of these numbers in 2's complement representation? What is the largest and smallest number that can be represented?

  Why do companies need a technology roadmap

Why do companies need a technology roadmap? What utility to they bring to the organization? Who should be in charge of developing a technology roadmap?

  Write a function that takes as an input an 80 element

Write a function that takes as an input an 80 element character array and has a return type that is void.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd