100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

FOR3702 ASSIGNMENT 02 SEMESTER 02 ANSWERS

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
13-09-2024
Written in
2024/2025

FOR3702 ASSIGNMENT 02 SEMESTER 02 ANSWERS FOR3702 Assignment 2 Question 1 The crime rate in South Africa is high. Criminals often make use of social engineering, phishing, whaling, and baiting to commit crimes. How is social engineering often committed? (10) Question 2 There are various types of investigations that are conducted, such as criminal investigation, civil investigation, and commission of enquiries. In your own words explain the objectives of corporate investigation. (10) Question 3 Strikes and pickets in the workplace must be lawful. Employees who engage in unlawful industrial actions in violation of the employer’s policies can be brought before disciplinary hearings. Discuss non-compliance with policy. (10) Question 4 Every organisation or business should conduct a risk assessment so that it can maintain the going concern principle. How would you deal with identified risks in your organisation or business? (10) Question 5 Law enforcement is tasked with the responsibility of maintaining law and order in the country. How would you implement a situational crime prevention strategy? (10) QUESTION 6 Often criminals plan before they commit crimes. Discuss crime prevention through environment design. (10) QUESTION 7 Discuss how you can go about securing hardware and software. (10) QUESTION 8 Discuss how a risk analysis exercise is conducted. (10) TOTAL:

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 13, 2024
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

RONSAM
TUTORS
FOR3702 ASSIGNMENT 02 SEMESTER 02




DISCLAIMER!!!: The assignments sold through this website
are intended for research, study, and reference purposes
only. They are not to be submitted as your own work. Only
use this document as reference to generate your own
assignment


FOR EXAMS, PORTFOLIO, AND ASSIGNMENT ASSISTANCE
WHATSAPP 0671189059 EMAIL:


,ASSIGNMENT 2
QUESTION 1
The crime rate in South Africa is high. Criminals often make use of social
engineering, phishing, whaling, and baiting to commit crimes. How is social
engineering often committed? (10)


Social engineering is a form of attack where cybercriminals manipulate people into
divulging confidential information or performing actions that compromise security.
According to the study guide for "Forensic Methods and Techniques" by G. Thenga
(2016), social engineering techniques are employed by cybercriminals to deceive
unsuspecting users into revealing their confidential data, infecting their computers
with malware, or opening links to infected sites. This is often achieved by exploiting a
computer user's lack of knowledge about technology, the value of data, and how to
best protect it (Thenga, 2016).

Social engineering in the context of information security refers to the "psychological
manipulation of people into performing actions or divulging confidential information"
(Thenga, 2016). Unlike traditional confidence tricks, social engineering often forms
part of a more complex fraud scheme aimed at information gathering, fraud, or
gaining unauthorized access to systems. This method targets the human element of
security, which can be the weakest link in any security framework, exploiting people's
inherent trust and their susceptibility to manipulation through well-proven
psychological techniques (Thenga, 2016).

Cybercriminals apply social engineering techniques against individuals who can be
persuaded, against their better judgment, to believe or do things they should not.
The inherent complexity of information technology systems, which cannot be fully
understood by many people, increases the likelihood that information security will be
compromised through such indirect attacks (Thenga, 2016). For example, an
attacker might impersonate a trusted individual or organization to gain the trust of the
target and then deceive them into revealing sensitive information, such as
passwords or financial data. This approach is particularly effective because it
bypasses technical security measures by targeting human psychology (Thenga,
2016).

, social engineering is a potent method used by cybercriminals to exploit human
vulnerabilities to access confidential data and commit various crimes. It relies on
psychological manipulation and persuasion, often forming part of a larger fraudulent
scheme. Alongside social engineering, numerous other methods are employed by
criminals, including phishing, baiting, data manipulation, and using malicious
software such as Trojan horses and viruses. To mitigate these threats, it is crucial to
enhance public awareness and understanding of information technology, as well as
strengthen the capacity of law enforcement agencies to detect and investigate such
crimes.



QUESTION 2


There are various types of investigations that are conducted, such as criminal
investigation, civil investigation, and commission of enquiries. In your own
words explain the objectives of corporate investigation. (10)


Corporate investigations are conducted to ascertain the truth regarding particular
incidents, determine responsibility, and provide organizations with critical information
to address potential issues or prevent future occurrences. The primary objective of a
corporate investigation is to discover what happened, how it happened, when it
occurred, why it occurred, where it took place, and who was involved. This process
involves gathering and analyzing evidence to reveal the facts surrounding the
incident in a manner that is legally sound and compliant with all applicable rules and
regulations (Thenga, 2016).

The scope of a corporate investigation may encompass various aspects, including
but not limited to financial misconduct, breaches of company policy, fraud,
corruption, internal theft, data breaches, and non-compliance with regulations. Once
an investigation concludes, several outcomes are possible, such as prosecution,
disciplinary measures, preventive action, amendment of company policy, or civil
recovery. These actions serve to hold the responsible parties accountable and
prevent future occurrences of similar issues.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
VBPSEDUPROS SN Tutors
View profile
Follow You need to be logged in order to follow users or courses
Sold
723
Member since
2 year
Number of followers
473
Documents
221
Last sold
1 week ago
VBPS EDUPROS

Exams, assignment solutions and study notes

4,1

114 reviews

5
69
4
13
3
16
2
4
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions