0 items
- Description
CMGT 433 Wk 3 Discussion – Identity and Access Exploits
Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.
Due Day 3
Respond to the following in a minimum of 175 words:
Malicious hackers know that users are prone to be points of vulnerability on a given network. They take advantage of human errors by carrying out social engineering attacks or other forms of identity threats that aim to infiltrate a system via any weak point that can be found. Identity and access management systems are designed to enable organizations to manage user levels, privileges, and access security.
- Describe 2 common ways secured accounts can be targeted in identity and authorization exploits.
- What techniques would you use as preventive measures against either of these types of exploits?
Due Day 7
Post 2 replies to classmates or your faculty member. Be constructive and professional.