Social Engineering. These attacks result from internal weaknesses which expose the school’s system, e.g. poor password use.
Appears in 2 contracts
Sources: Technology Acceptable Use Agreement, Technology Acceptable Use Agreement
Social Engineering. These attacks result from internal weaknesses which expose the school’s system, e.g. poor password use.
Appears in 2 contracts
Sources: Technology Acceptable Use Agreement, Technology Acceptable Use Agreement