Cyber Defense and Penetration Testing: Week 8 - Social Engineering

LoadingLoading previews...
Social Engineering
HTML Creative Commons: Attribution-Noncommercial-No Derivative Works 4.0
View
    Social Engineering
    Social Engineering
    1 file in this resource
    Summary: Since the first attempts to protect information, the weakest link in the security chain has always been the people involved. A system can have the most expensive firewall equipment, the best anti­virus software and the greatest intrusion detection system, but if the "weakest link" is ignored it can be worthless. Hence, no matter how secure the equipment is from electronic invasion, the knowledge extracted from a legitimate user may render a computer network inoperable if used in an unauthorised manner.
    Creators:
    Divisions: Academic > School of Computing, Engineering and Built Environment > Department of Computing
    Copyright holder: Copyright © Glasgow Caledonian University
    Viewing permissions: World
    Depositing User:
    Date Deposited: 26 Sep 2018 13:47
    Last Modified: 13 Feb 2020 12:10
    URI: https://edshare.gcu.ac.uk/id/eprint/4129

    Actions (login required)

    View Item View Item

    Toolbox

    There are no actions available for this resource.