(1.) Social Engineering techniques are often used to trick users into giving out important information. List two of the recommendations from the OER readings for avoiding social engineering attacks and briefly describe why they are important (5 points).
(2.) For malware incident prevention, what are the recommended practices an organization should follow according to NIST Special Publication 800-83? List them in the right order. Describe more on the importance of recommendation No.2 (10 points).
National Institute of Standards and Technology (NIST). (2013). Guide to Malware Incident Prevention and Handling. NIST Special Publication 800-83. Retrieved from: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf.