Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "User"

From NetSec
Jump to: navigation, search
(Vulnerabilities)
Line 10: Line 10:
  
 
* [[Social engineering]]
 
* [[Social engineering]]
* [[Kidnapping]] (either himself or relatives)
+
* Kidnapping (either himself or relatives)
* [[Interrogation]] and [[torture]]
+
* Interrogation and torture
  
 
= Patching a user =
 
= Patching a user =
  
 
To resist to social engineering, penetration tests can diagnose and identify weak links, so that their hierarchy may educate them on resisting to social engineering. As for kidnapping and interrogation, the best solution for the organization is to fragment knowledge, so that no single individual may compromise the whole system.
 
To resist to social engineering, penetration tests can diagnose and identify weak links, so that their hierarchy may educate them on resisting to social engineering. As for kidnapping and interrogation, the best solution for the organization is to fragment knowledge, so that no single individual may compromise the whole system.

Revision as of 13:53, 24 April 2012

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.

A user is a physical person who runs software on a computer system.

Attack surface

  • The mind
  • The body
  • Feelings and sentiments

Vulnerabilities

Patching a user

To resist to social engineering, penetration tests can diagnose and identify weak links, so that their hierarchy may educate them on resisting to social engineering. As for kidnapping and interrogation, the best solution for the organization is to fragment knowledge, so that no single individual may compromise the whole system.