Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "User"
From NetSec
Gonzalo58T (Talk | contribs) |
|||
(2 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
{{expand}} | {{expand}} | ||
− | A user is a physical person who runs software on a computer system. | + | A user is a physical person who runs software on a computer system, usually vulnerable to [[social engineering]]. |
= Attack surface = | = Attack surface = | ||
Line 6: | Line 6: | ||
* The body | * The body | ||
* Feelings and sentiments | * Feelings and sentiments | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
= Patching a user = | = Patching a user = | ||
To resist to social engineering, penetration tests can diagnose and identify weak links, so that their hierarchy may educate them on resisting to social engineering. As for kidnapping and interrogation, the best solution for the organization is to fragment knowledge, so that no single individual may compromise the whole system. | To resist to social engineering, penetration tests can diagnose and identify weak links, so that their hierarchy may educate them on resisting to social engineering. As for kidnapping and interrogation, the best solution for the organization is to fragment knowledge, so that no single individual may compromise the whole system. |
Latest revision as of 22:23, 27 May 2012
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
A user is a physical person who runs software on a computer system, usually vulnerable to social engineering.
Attack surface
- The mind
- The body
- Feelings and sentiments
Patching a user
To resist to social engineering, penetration tests can diagnose and identify weak links, so that their hierarchy may educate them on resisting to social engineering. As for kidnapping and interrogation, the best solution for the organization is to fragment knowledge, so that no single individual may compromise the whole system.