𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Click, click, who's there?

✍ Scribed by Marc Boroditsky


Book ID
104392880
Publisher
Elsevier Science
Year
2010
Tongue
English
Weight
192 KB
Volume
2010
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


engineering technology attack vectors can be countered, but without interfering with the actual business process. This form of security protection, says Jones, is important because, unlike traditional user education, it does not require hours and hours of indoctrination training to make users understand what they should not do in a contextdriven social engineering hack.

"It doesn't take much in the way of time, and doesn't stop the normal business workflow," says Jones. "It's also highly automated and stops an attackquite literally -as it happens."

About the author

Steve Gold has been a business journalist and technology writer for 26 years


πŸ“œ SIMILAR VOLUMES


cover
✍ Campbell, James Calum πŸ“‚ Fiction πŸ“… 2015 πŸ› Impress Books 🌐 English βš– 182 KB

"I once told you, Cameron-Strange, that there is a tipping point. Stay this side of it, and the failsafe mechanisms apply. Cross it, and the past is irrevocable."

CHEMISTRY: Click Chemistry Clicks Along
✍ Service, R. F. πŸ“‚ Article πŸ“… 2008 πŸ› American Association for the Advancement of Scienc 🌐 English βš– 224 KB