What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?