One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 432286
Date de publication 2017-11-14 09:24:29 (vue: 2017-11-14 09:24:29)
Titre NBlog November 13 - a rich seam
Texte So much of human interaction involves techniques that could legitimately be called social engineering that we're spoilt for choice on the awareness front for December.  December's topic exemplifies the limitations of "cybersecurity" with its myopic focus on IT and the Internet. Social engineers bypass, undermine or totally ignore the IT route with all its tech controls, and that's partly what makes them such a formidable threat. IT may be a convenient mechanism for identifying, researching and communicating with potential victims, for putting on the appearance of legitimate, trustworthy individuals and organizations, and for administering the scams, but it's incidental to the main action: fooling the people.Maybe it's true that you can't fool all of the people all of the time, depending on precisely what is meant by 'all'. I think it's fair to say that we are all (virtually without exception) prone, predisposed or vulnerable to social engineering of one form or another. We can't help it: social interaction is genetically programmed into us and reinforced throughout our lives from the moment we're born, or even before. Some expectant mothers report their babies respond to the music and other sounds around them. A newborn baby probably recognizes its mother's and other familiar voices and sounds immediately. To what extent it trusts or could be fooled by them is a separate issue though!The idea that we are inherently vulnerable, while powerful, is only part of the story. We're also inherently capable of social engineering. We have the capacity, the tools and capabilities to influence and manipulate others to varying extents. Again, that newborn baby is sending out an avalanche of signals to humans in the area, from the moment of its first gasp and cry. The communications may be non-verbal but they are loud and clear!
Envoyé Oui
Condensat   december  it  some action: administering again all also another appearance are area around avalanche awareness babies baby before born but bypass called can capabilities capable capacity choice clear communicating communications controls convenient could cry cybersecurity december depending engineering engineers even exception exemplifies expectant extent extents fair familiar first focus fool fooled fooling form formidable from front gasp genetically have help human humans idea identifying ignore immediately incidental individuals influence inherently interaction internet involves issue it: its legitimate legitimately limitations lives loud main makes manipulate may maybe meant mechanism moment mother mothers much music myopic nblog newborn non november one only organizations other others out part partly people potential powerful precisely predisposed probably programmed prone putting recognizes reinforced report researching respond rich route say scams seam sending separate signals social sounds spoilt story such tech techniques that them think though threat throughout time tools topic totally true trusts trustworthy undermine varying verbal victims virtually voices vulnerable what without
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: