Click, click, who's there?
β Scribed by Marc Boroditsky
- Book ID
- 104392880
- Publisher
- Elsevier Science
- Year
- 2010
- Tongue
- English
- Weight
- 192 KB
- Volume
- 2010
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
β¦ Synopsis
engineering technology attack vectors can be countered, but without interfering with the actual business process. This form of security protection, says Jones, is important because, unlike traditional user education, it does not require hours and hours of indoctrination training to make users understand what they should not do in a contextdriven social engineering hack.
"It doesn't take much in the way of time, and doesn't stop the normal business workflow," says Jones. "It's also highly automated and stops an attackquite literally -as it happens."
About the author
Steve Gold has been a business journalist and technology writer for 26 years
π SIMILAR VOLUMES
"I once told you, Cameron-Strange, that there is a tipping point. Stay this side of it, and the failsafe mechanisms apply. Cross it, and the past is irrevocable."