How well did you do on the test and what did you learn

Assignment Help Computer Engineering
Reference no: EM132239225

Question: One of the key topics we have been learning about is ensuring that all users are aware of security threats. Email phishing is a common threat that a user may face. Using email phishing tests are a very good way to train users. Now is your chance to try one for yourself. Take the email phishing test at the link below:

Once you have completed the test, write at least 1-page reflection on your experience. Be sure to follow APA format for your paper and don't forget to double-space your assignment. Answer the following questions in your paper:

1. How well did you do on the test and what did you learn?

2. How could you use this test to train employees about phishing?

3. What controls would you suggest to mitigate the risk of email phishing?

In this assignment, I am looking for your reflection on this assignment and how you will apply what you learned in your career. Your paper should be about what you learned and not a research paper about email phisihing.

This assignment will be checked for plagiarism using SafeAssign.

Reference no: EM132239225

Questions Cloud

Discuss about the remote access solutions : Discuss with your peers which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS).
How well does the video on the legislative section match up : How do the three branches of government, and outside forces, influence and interact on an important policy issue?
Give an example of each of the two strategies : Give an example of each of the two (2) strategies in current world politics and speculate on their effectiveness.
Propose how written and oral communication should be used : Assume you are a candidate for a director of communications for a major metropolitan county.
How well did you do on the test and what did you learn : One of the key topics we have been learning about is ensuring that all users are aware of security threats. Email phishing is a common threat that a user may.
How you do or could use operations security in current job : Describe how you do or could use operations security in your current job. Be sure to describe your job role (or desired job role). Your goal in completing.
The difference between a theocracy and western democracy : For this weeks discussion board please explain what is the difference between a Theocracy and Western Democracy?
Describe the fundamental security policies : Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2 types of industries.
How can statistical data be used to achieve the goal of hsem : Given the significance of politics and policy in homeland security emergency management, how can statistical data be used to achieve the goal of HSEM?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd