DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 6451

19.4 – Staff Training

0

Countermeasure: Employee & Staff Training Employee and staff training on human security management is very important for overall protection. Employees who work remotely are becoming increasingly frequent, posing additional threats. The chance of remote employees’ systems being infected by a keylogger or other malicious code through a phishing and other attacks, and then spreading the […]

This post is only available to members.

19.3 – Phishing & Countermeasure

0

The best way to get another person’s login credentials is by asking them. Though it sounds impractical and obvious, it is the most extensively used technique to get sensitive information. Phishing has become the Internet’s equal of asking for login credentials, and computer users fall victims every year to phishing frauds. Phishing is a criminal […]

This post is only available to members.

19.2 – Dumpster Diving & Shoulder Surfing

0

Dumpster Diving & Shoulder Surfing Techniques Dumpster Diving Dumpster diving is the technique of looking in the trash for critical data that has not been correctly disposed of. While this technique may sound dirty, it is a very satisfying one. One possible reason for the extensive use of this technique is its non-technical temperament. Social […]

This post is only available to members.

19.1 – Social Engineering Techniques

0

We all are aware of the type of attacker who leverages his technical skill to penetrate protected computer systems and compromise critical information. We hear such attack vectors in the news all the time, and we are motivated to counter their exploits by spending on new technologies that will boost our network security. Nonetheless, there […]

This post is only available to members.

19.0 – Human Security

0

Introduction to “Human Security” Human security is about protecting people’s freedoms. It requires defending people from significant and invasive threats, and allowing them to take charge of their own lives. Protection refers to the policies, norms, and organizations necessary to protect people, and could involve a ‘top-down method’ as typical in  democratic governance. Empowerment underlines […]

This post is only available to members.