1. Identify a voluntary organization and discuss its role in emergency management. Discuss how the volunteers are trained and managed.
2.Social networks have become popular media among individuals of all ages to stay connected with friends, family, colleagues and coworkers. However, many users are unaware of the dangers of sharing vast amounts of personal information on social networks.
- How can social networking be used to facilitate social engineering attacks?
- What can individuals and organizations do to secure personal and proprietary information from these attacks 3. What is an Advanced Persistent Threat (APT)? What is the goal of an APT? How can a business protect itself from an APT? What tools can be used to detect an APT? Be sure to cite sources.