User Security training covers basic information security for system users. General Security training for administrators focuses on system security concepts. Social Engineering training teaches protection against social engineering attacks
Network security prevents unauthorized access and monitors network resources. Authentication starts with username and password, followed by two or three factors. Firewalls enforce access policies and protect against malware. Communication between hosts may be encrypted for security
Born in 1916 in Brooklyn to Sephardi Jewish immigrants. Worked at Douglas Aircraft Company and Wright Field during WWII. Designed Trend Home project for Earl Muntz at age 32. Founded Scientific Research Laboratories in Los Angeles
Social engineering manipulates people to gain unauthorized access or financial gain. Attackers present themselves as trusted individuals to gain access. People's willingness to help or fear of punishment drives most attacks
Born in 1963 in Van Nuys, California. Developed passion for electronics from young age. First hacked USC's The Ark computer in 1979. Used social engineering to gain access to systems
ILOVEYOU virus spread rapidly through Microsoft Outlook in May 2000. Virus reached 45 million users in 10 days, causing $10 billion in damage. Affected major companies including Ford, AT&T, Microsoft and government agencies