In the given scenario, Alana's actions pose a risk related tosharing confidential data on unsecured networks. Here's why:BYOD (Bring Your Own Device): Alana used her personal laptop in a public cafeteria. This falls under the BYOD concept, where employees use their personal devices for work-related tasks.Unsecured Network: Connecting to the public Internet in a cafeteria means she is using an unsecured network. Public Wi-Fi networks are often vulnerable to eavesdropping and unauthorized access.Email Communication: Alana received a project modifications file via email and sent back another file with changes. Email communication over an unsecured network can expose sensitive information to potential attackers.Risk: By sharing project-related files over an unsecured network, Alana risks exposing confidential data to unauthorized individuals.EC-Council Certified Security Specialist (E|CSS) course materials and study guide.EC-Council Certified Security Specialist (E|CSS) documents and course content12.
In the given scenario, Alana's actions pose a risk related tosharing confidential data on unsecured networks. Here's why:
BYOD (Bring Your Own Device): Alana used her personal laptop in a public cafeteria. This falls under the BYOD concept, where employees use their personal devices for work-related tasks.
Unsecured Network: Connecting to the public Internet in a cafeteria means she is using an unsecured network. Public Wi-Fi networks are often vulnerable to eavesdropping and unauthorized access.
Email Communication: Alana received a project modifications file via email and sent back another file with changes. Email communication over an unsecured network can expose sensitive information to potential attackers.
Risk: By sharing project-related files over an unsecured network, Alana risks exposing confidential data to unauthorized individuals.
EC-Council Certified Security Specialist (E|CSS) course materials and study guide.
EC-Council Certified Security Specialist (E|CSS) documents and course content12.