bookmate game
en
William Simon,Kevin Mitnick

The Art of Deception

Giv mig besked når bogen er tilgængelig
Denne bog er ikke tilgængelig i streaming pt. men du kan uploade din egen epub- eller fb2-fil og læse den sammen med dine andre bøger på Bookmate. Hvordan overfører jeg en bog?
  • Tina Whitehar citeretfor 4 år siden
    When you steal money or goods, somebody will notice it's gone. When you steal information, most of the time no one will notice because the information is still in their possession.
  • Tina Whitehar citeretfor 4 år siden
    Policy: Personal identifiers such as employee number, social security number, driver's license number, date and place of birth, and mother's maiden name should never be used as a means of verifying identity.
  • Tina Whitehar citeretfor 4 år siden
    Policy: M1 privileged accounts must have a strong password: The password must:

    Not be a word found in a dictionary in any language

    Be mixed upper and lower case with at least one letter, one symbol, and one numeral

    Be at least 12 characters in length

    Not be related to the company or individual in any way.
  • Tina Whitehar citeretfor 4 år siden
    Policy: The company's external Web site shall not reveal any details of corporate structure or identify any employees by name.
  • Tina Whitehar citeretfor 4 år siden
    Items of Confidential information generally fall into one of these categories:

    Information concerning trade secrets, proprietary source code, technical or functional specifications, or product information that could be of advantage to a competitor.

    Marketing and financial information not available to the public. Any other information that is vital to the operation of the company such as future business strategies.
  • Tina Whitehar citeretfor 4 år siden
    In fact, as improvements are made if I the technological weapons against security breaches, the social engineering approach to using people to access proprietary company information or penetrate the corporate network will almost certainly become significantly more frequent and attractive to information thieves.
  • Tina Whitehar citeretfor 4 år siden
    New employees should be required to attend the training as part of their initial indoctrination.
  • Tina Whitehar citeretfor 4 år siden
    Members of the Hare Krishna religious cult were very effective at influencing people to donate to their cause by first giving them a book or flower as a gift. If the recipient tried to return the gift, the giver would refuse remarking, "It's our gift to you." This behavioral principle of reciprocation was used by the Krishnas to substantially increase donations.
  • Tina Whitehar citeretfor 4 år siden
    For some strange reason, antivirus manufacturers do not market products that will detect commercially available spyware.
  • Tina Whitehar citeretfor 4 år siden
    Like the rest of us, they were making judgments based on appearances--a serious vulnerability that social engineers learn to take advantage of.
fb2epub
Træk og slip dine filer (ikke mere end 5 ad gangen)