Social engineering 101

By on

Most IT security professionals know how to define social engineering. Security professionals likely know who Kevin Mitnick is, and have perhaps even read his book, The Art of Deception. It is also common practice among IT security professionals to cover the subject as a part of their security awareness training program. But being fully armored against the threat of social engineering is only the beginning. Now it is time to move on to more interesting topics, such as server hardening, IDS or single sign-on solutions.

Penetration testing can often entail thousands of dollars' worth of industry-leading scanning and penetration testing tools. But, testing for social engineering -- a cruder and more inexpensive attack method -- should also be a part of any company's penetration testing repertoire. After all, ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?