O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Social Engineering

The human factors already mentioned are not the only times when humans are the weakest link in the security chain. By using social engineering, a skillful enemy can often trick your staff into divulging otherwise secret information or trick them into doing something that might help the attacker obtain access to data or systems he should not be able to access. Usually social engineering is a multistep, multiplayer game in which, with each step, the attacker gets closer to his goal. Social engineering is especially difficult to protect from because the people who do it are usually professionals in their field. The average hacker might have less-than-average verbal abilities, but this kind of person is not average. It is probably ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required