The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Management of Information Security
Management of Information Security
Social engineering in information assurance curricula
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
SMEs and Cybersecurity Threats in E-Commerce
The EDP Audit, Control, and Security Newsletter
Journal of Computing Sciences in Colleges
Social Engineering: The Neglected Human Factor for Information Security Management
Information Resources Management Journal
Hi-index | 0.01 |
The key to maintaining the confidentiality, integrity, and availability of an organizations information and information systems is controlling who accesses what information. This is accomplished by being able to identify the requestor, verifying the requestor is not an impostor, and ensuring that the requestor has the proper level of clearance to access a given resource. There have always been those that attempt to by-pass this security mechanism through brute force or guile. In the past, those who use guile have been called confidence men and con artists. Today, these people are called social engineers, but the tactics remain the same even if the objectives have changed.