Video Description

In this segment Information Security Governance & Risk Management, the discussion begins with Confidentiality. We'll define what is met by Confidentiality, what its threats are, and what strategies are used to address them. You'll learn easy it is to gain unauthorized access and disclosure of information using Social Engineering, and discuss other means of intrusion. You'll learn why and how Social Engineering is the biggest threat to confidentiality, how prevalent is in most major attacks of the day, and we'll discuss a number of key examples on how social engineering can change the balance of power to compromise security in the workplace.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring