Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
Delwin Thermitus
Cyber Security
Security 1 Part 2
-
Social Engineering
o Manipulating the humans
▪ Compromises confidentiality
o Comes in many forms
▪ Telephone calls
▪ Emails/Electronic communications
▪ Unexpected visitors
o Tailgating
▪ Waiting for someone to enter or exit a locked door or area and slipping in
behind them