Cristin-resultat-ID: 857681
Sist endret: 30. juli 2013, 13:14
Resultat
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
2011

Suggesting Processes to Double-Cross Social Engineers

Bidragsytere:
  • Guttorm Sindre

Bok

Perspectives in Business Informatics Research - Local Proceedings
ISBN:
  • 978-9984-30-197-6

Utgiver

Riga Technical University / JUMI Publishing House

Om resultatet

Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
Publiseringsår: 2011
Sider: 99 - 106
ISBN:
  • 978-9984-30-197-6

Beskrivelse Beskrivelse

Tittel

Suggesting Processes to Double-Cross Social Engineers

Sammendrag

Many organizations spend considerable sums on technical infrastructure to ensure information security, while still lacking any systematic approach to counter so-called "social engineering" attacks, where people gain illegitimate access to information or computing resources for instance by calling and asking for the information, rather than using advanced hacking attacks. Increased awareness through employee training is an obvious way to reduce the success-ratio of such attacks, but possibly even more could be gained by combining this with clearly defined policies and processes to deal with such attacks. Commonly suggested processes advocate the systematic verification of identity for in-formation requests that may be legitimate if the caller is who he claims to be, and flat rejection of illegitimate requests. This paper argues that an alternative approach, where the attacker is lured on, believing that the attack is succeeding, might in some cases provide even better protection.

Bidragsytere

Guttorm Sindre

  • Tilknyttet:
    Forfatter
    ved Institutt for datateknologi og informatikk ved Norges teknisk-naturvitenskapelige universitet
1 - 1 av 1

Resultatet er en del av Resultatet er en del av

Perspectives in Business Informatics Research - Local Proceedings.

Niedrite, Laila; Strazdina, Renate; Wangler, Benkt. 2011, RTU, HiS, LUVitenskapelig antologi/Konferanseserie
1 - 1 av 1