It appears that someone is using your firm's corporate directory-which includes job titles and email addresses-to contact senior managers and directors via email. The email requests that the recipient click on a URL, which leads to a Web site that looks as if it were designed by your Human Resources organization. Once at this phony Web site, the employees are asked to confirm the bank and account number to be used for electronic deposit of their annual bonus check. You are a member of IT security for the firm. What can you do? 1. develop a problem statement, 2. identify alternatives, 3. evaluate and choose alternatives, 4. (how you would) implement decision, and 5. (how you would) evaluate results. Make sure that each step of the process is labeled and that each part of the question is answered.
It appears that someone is using your firm's corporate directory-which includes job titles and email addresses-to contact senior managers and directors via email. The email requests that the recipient click on a URL, which leads to a Web site that looks as if it were designed by your Human Resources organization. Once at this phony Web site, the employees are asked to confirm the bank and account number to be used for electronic deposit of their annual bonus check. You are a member of IT security for the firm. What can you do?
1. develop a problem statement, 2. identify alternatives, 3. evaluate and choose alternatives, 4. (how you would) implement decision, and 5. (how you would) evaluate results. Make sure that each step of the process is labeled and that each part of the question is answered.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps