subject

You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows some accounts have been compromised, with their login and passwords overwritten by the hackers. They need to reset the accounts that the hackers have changed the passwords on. However, they don't have access to the passwords directly, and the change records were corrupted by the attack. They need students and staff to confirm their passwords by logging into a secure site. If the login fails, they'll know your account was compromised and reset your account immediately. a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments phone number and call them about the email.
b.) This is a serious issue, and the email came from the head of IT. The site also shows that it's secure. The longer it takes to reset accounts, the longer the hackers will have access to your account. Follow the instructions in the email from the head of IT.

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 22.06.2019 10:30, JeroMii
Think about a recent customer service experience - either positive or negative. write a brief summary of that experience. now think about those four characteristics we look for in customer service representatives. how did the representative in your example stack up? write down your answer and give specific examples.
Answers: 1
image
Computers and Technology, 22.06.2019 13:30, AsiaDeas4078
Write lines of verse that rhyme to remember the following information: acid rain is a type of air pollution caused by chemicals in the air.
Answers: 1
image
Computers and Technology, 22.06.2019 14:50, williamsgregg5214
Drag each label to the correct location on the image list the do’s and don’ts of safeguarding your password. a. keep yourself logged in when you leave your computer. b. don’t write your password down and leave it where others can find it. c. share your password with your friends. d.each time you visit a website, retain the cookies on your computer. e. use a long password with mixed characters.1. do's 2. don'ts
Answers: 2
You know the right answer?
You receive an email from your school's head of IT. There is a concern for a potential hack to the s...

Questions in other subjects:

Konu
History, 01.07.2019 00:20