subject

You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows some accounts have been compromised, with their login and passwords overwritten by the hackers. They need to reset the accounts that the hackers have changed the passwords on. However, they don't have access to the passwords directly, and the change records were corrupted by the attack. They need students and staff to confirm their passwords by logging into a secure site. If the login fails, they'll know your account was compromised and reset your account immediately. a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments phone number and call them about the email.
b.) This is a serious issue, and the email came from the head of IT. The site also shows that it's secure. The longer it takes to reset accounts, the longer the hackers will have access to your account. Follow the instructions in the email from the head of IT.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 05:00
Which best explains why a digital leader would join a society specializing in technology
Answers: 1
question
Computers and Technology, 23.06.2019 13:10
What is domain name system (dns)? allows dynamic ip address allocation so users do not have to have a preconfigured ip address to use the network converts ip addresses into domains, or identifying labels that use a variety of recognizable naming conventions the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures the integration of communication channels into a single service
Answers: 2
question
Computers and Technology, 23.06.2019 22:00
Take a critical look at three gui applications you have usedβ€”for example, a spreadsheet, a word-processing program, and a game. describe how well each conforms to the gui design guidelines listed in this chapter.
Answers: 3
question
Computers and Technology, 24.06.2019 17:40
Create a file called favorite_foods, and list your favorite foods, entering five or six or more. press enter after each favorite food so it appears on its own line (make certain you also press enter after the final food item). after the file is created, add two more foods you like that are not on the list (press enter after the final food item). view the list of foods to make certain the two items you added appear at the end of the list
Answers: 2
You know the right answer?
You receive an email from your school's head of IT. There is a concern for a potential hack to the s...
Questions
question
History, 09.01.2020 10:31
question
Mathematics, 09.01.2020 10:31
Questions on the website: 13722367