Social Engineering: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Research Project - Security Precautions (Social Engineering) | Research Project - Security Precautions (Social Engineering) | ||
== | ==References== | ||
{{reflist}} | |||
[http:// | ==External Links== | ||
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)] | |||
[http:// | * [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)] | ||
[http:// | * [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals] | ||
[http:// | * [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks] | ||
[http://www. | * [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering] | ||
[http://www. | * [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ] | ||
[http://www. | * [http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=15170&mode=thread&order=0&thold=0 Social Engineering Defense 101] | ||
[http:// | * [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering] | ||
[http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done] | * [http://techrepublic.com.com/5208-6230-0.html?forumID=102&threadID=232696 Social Engineering Self-defense] | ||
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done] |
Revision as of 23:42, 21 July 2008
Research Project - Security Precautions (Social Engineering)