FINANCIAL DATA AT A CREDIT UNION.
Perform an investigation and write a plan/report for accumulating data, information, or knowledge that could be used for illegal or unscrupulous political, financial, social or technological gain. Information security begins with an understanding of DIK assets. Once that understanding is established, means, motive, and opportunity for compromising access to specific DIK sub-sets may be formulated. Assume that you are being watched while doing your DIK collection. Consider methods for remaining anonymous, for hiding behind legitimate entities, and/or that use social engineering to elude your identification. Address each of the following concerns.

Leave a Reply
Want to join the discussion?Feel free to contribute!