Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this segment Information Security Governance & Risk Management, the discussion begins with Confidentiality. We'll define what is met by Confidentiality, what its threats are, and what strategies are used to address them. You'll learn easy it is to gain unauthorized access and disclosure of information using Social Engineering, and discuss other means of intrusion. You'll learn why and how Social Engineering is the biggest threat to confidentiality, how prevalent is in most major attacks of the day, and we'll discuss a number of key examples on how social engineering can change the balance of power to compromise security in the workplace.