Computer Security (Physical Security (Biometrics (Scan Fingerprints, Scan…
Level of security depends on resources and value of what you're protecting
Armed Guards/ Security Guards for high end information
Access control cards
Locking down Laptops
Disabling USB and Ethernet Ports not in use
Encrypt Computer Files
Allow two factor authentication
Requires Passwords of Files
Keep Software up to date
Confirm Users are on the secured network
Prevent non users from being on the Network
Disable Ethernet Ports not in use
Set a strong password for the router
Change the Admin password
Backup Router to a offsite location
Is a vicious cycle of gaining trust and then attacking
Identifies the Victim to engage.
Gains the victims trust/Makes up a story.
Launches attack to disrupt company flow or extract something, continues charade they're telling the victim.
Brings charade to an end, covers tracks.