Search
Now showing items 21-30 of 52
EVALUATION OF PHISHING ATTACKS AGAINST A HIGHER EDUCATION PUBLIC INSTITUTION
(East Carolina University, 2022-04-22)
While security vendors have documented trends in phishing attacks across numerous industries, there remains a gap in available data for phishing attacks against higher education institutions.
This researcher studied ...
SURVEY OF SOCIAL ENGINEERS AND THE VALIDITY OF DEFENSIVE TECHNIQUES
(East Carolina University, 2022-05-12)
In the context of information technology, social engineering is a nexus of computers and humans. Defenders need to know how hackers and other deviant actors attempt to interact with users. Social engineers are sometimes ...
Is Digital Piracy a Crime?
(2022-04-19)
Digital piracy is the unauthorized illegal copying and distribution of digital copyrighted content. Copyrighted content refers to Intellectual Property. Property that consist of intangible creations of the human intellect. ...
Mobile Device Management Policy
(2022-04-08)
The use of mobile devices in the workplace has grown significantly over the years. Most adults do not leave home without their phones, laptops, tablets, or other portable media devices. With this expansion, there needed ...