Social Engineering: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 1: | Line 1: | ||
==Social Engineering== | Research Project - Security Precautions (Social Engineering) | ||
Website for Topic: Here | |||
* Current Main Page | |||
* Current Study Guide | |||
Links: | |||
[http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)] | |||
[http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals] | |||
[http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks] | |||
[http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering] | |||
[http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ] | |||
[http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=15170&mode=thread&order=0&thold=0 Social Engineering Defense 101] | |||
[http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering] | |||
[http://techrepublic.com.com/5208-6230-0.html?forumID=102&threadID=232696 Social Engineering Self-defense] | |||
[http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done] |
Revision as of 23:35, 21 July 2008
Research Project - Security Precautions (Social Engineering) Website for Topic: Here
* Current Main Page * Current Study Guide
Links:
Social Engineering (Wikipedia)
Social Engineering Fundamentals
Social Engineering Attacks
Proactive Defense to Social Engineering
Social Engineering FAQ
Social Engineering Defense 101
Best Defense Against Social Engineering
Social Engineering Self-defense
Social Engineering: Hackers show how it is done