CATEGORY: Human Security Management
19.4 – Staff Training
Countermeasure: Employee & Staff Training Employee and staff training on human security management is very important for overall protection. Employees who work remotely are becoming increasingly frequent, posing additional threats. The chance of remote employees’ systems being infected by a keylogger or other malicious code through a phishing and other attacks, and then spreading the […]
19.3 – Phishing & Countermeasure
The best way to get another person’s login credentials is by asking them. Though it sounds impractical and obvious, it is the most extensively used technique to get sensitive information. Phishing has become the Internet’s equal of asking for login credentials, and computer users fall victims every year to phishing frauds. Phishing is a criminal […]
19.2 – Dumpster Diving & Shoulder Surfing
Dumpster Diving & Shoulder Surfing Techniques Dumpster Diving Dumpster diving is the technique of looking in the trash for critical data that has not been correctly disposed of. While this technique may sound dirty, it is a very satisfying one. One possible reason for the extensive use of this technique is its non-technical temperament. Social […]
19.1 – Social Engineering Techniques
We all are aware of the type of attacker who leverages his technical skill to penetrate protected computer systems and compromise critical information. We hear such attack vectors in the news all the time, and we are motivated to counter their exploits by spending on new technologies that will boost our network security. Nonetheless, there […]
19.0 – Human Security
Introduction to “Human Security” Human security is about protecting people’s freedoms. It requires defending people from significant and invasive threats, and allowing them to take charge of their own lives. Protection refers to the policies, norms, and organizations necessary to protect people, and could involve a ‘top-down method’ as typical in democratic governance. Empowerment underlines […]


