Category: Human Security Management

19.4 – Staff Training

Countermeasure: Employee & Staff Training Employee and staff training on human security management is very important for overall protection. Employees who work remotely are becoming increasingly frequent, posing additional threats. The chance of remote employees’ systems being infected by a…
19.3 – Phishing & Countermeasure

The best way to get another person’s login credentials is by asking them. Though it sounds impractical and obvious, it is the most extensively used technique to get sensitive information. Phishing has become the Internet’s equal of asking for login…
19.2 – Dumpster Diving & Shoulder Surfing

Dumpster Diving & Shoulder Surfing Techniques Dumpster Diving Dumpster diving is the technique of looking in the trash for critical data that has not been correctly disposed of. While this technique may sound dirty, it is a very satisfying one.…
19.1 – Social Engineering Techniques

We all are aware of the type of attacker who leverages his technical skill to penetrate protected computer systems and compromise critical information. We hear such attack vectors in the news all the time, and we are motivated to counter…
19.0 – Human Security

Introduction to “Human Security” Human security is about protecting people’s freedoms. It requires defending people from significant and invasive threats, and allowing them to take charge of their own lives. Protection refers to the policies, norms, and organizations necessary to…