One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 433046
Date de publication 2017-11-15 07:10:03 (vue: 2017-11-15 07:10:03)
Titre NBlog November 15 - ethical social engineering for awareness
Texte Security awareness involves persuading, influencing and you could say manipulating people to behave differently ... and so does social engineering. So could social engineering techniques be used for security awareness purposes?The answer is a resounding yes - in fact we already do, in all sorts of ways.  Take the security policies and procedures, for instance: they inform and direct people to do our bidding. We even include process controls and compliance checks to make sure things go to plan. This is manipulative.Obviously the motivations, objectives and outcomes differ, but social engineering methods can be used ethically, beneficially and productively to achieve awareness. Exploring that idea even reveals some novel approaches that might just work, and some that are probably best avoided or reversed. Social engineering method, technique or approach Security awareness & training equivalents Pretexting: fabricating plausible situations
Envoyé Oui
Condensat     and  a  be  branding  combining  exploring  following  if  so  study  visual  written/self about achieve acting activities addressing adopting adult advertising after aggression aimed alert all already also analysis analyze analyzing and/or answer anticipating appealing apply approach approaches appropriate are arise artist aspects assertiveness assistance attacks attitudes attrition/blind audience audiences auditors auditory authority avoided awareness back bag before befriending behave behavioral cues behaviors being below beneficially benefits best bidding blasting blended blogs body both brazen building business business/personal but bypassing cadre can carpe case catching causes challenging changes character charming checks claiming classes clear clubs coherent cojones collaborating combining come communications complementary compliance compulsion con confidence confusion/doubt consistently contingency contingent continuity control controls conversations corporate corridor could counter cover covered covering covertly creating creative credentials cultural dangers days debt deceiving/telling deep determined develop developing diem differ differently direct directly discrete disparate distracting does doing door dumb dynamic earth education effort empathizing emphasize emphasizing engineered engineering enough entirely equivalents escape establishing etc ethical ethically ethics even events exaggerated exercises expectations exploit exploiting exploits fabricating facilitated fact false fast/full favor feel figuratively figures fitting flag flirting focus focused foot form forward fraudster friends/ambassadors from front frontal/noisy functions gain games gather gathering general generally get getting gift gifts give goal goals going grasp greed/vanity guard hacking hall/brown hand health hierarchies himself honest hook humanistic idea identify identifying improve incidents include including incorporating indebted indiscriminately individual individuals influencing inform information insider instance: interests interrupts investing involve involves issues joint just justify language later layers learning leaving led levels lies link long longer make making malware man management management/support managers manipulating manipulative marketing mask masquerading/mimicry materials measures meetings messages method methods metrics metrics/evidence might mode months more motivations multi multimedia mutuality nblog new news nice” norms not novel november objectives obtain obtained obvious obviously occur off old on; ones open opportunistic opportunities opposite organizational oriented ostensibly other others out outcomes outreach over overrides parties paying people perhaps persona personal persuading phishing phishing” phrasing picture plan planned planning plausible playing plays plus policies positives possible possibly posters practices pre present presentations/seminars presenting pretexting: previously priorities proactively probably procedural procedures process productively profiling program programs promises promoting puppetry purpose purposes putting qualifications quick quizzes rather reactive/responsive realistic reason recent/current record referrals referring regardless relationships reliance reputation researching resounding resources respect reveals reversed reward rewards risk root routes rôle safety say scenarios scorched scripted/pre secure secure; security see self selfish series setting several sharing shotgunning side/silent sidestepping simulations situations sleight slip slow/gradual snipering social some sorts speaking spear specific spotting statistics stories stronger studies study stuff subconscious subtle success such suitable support sure surprising system systematically systems take taking targeted/custom targeting targets team/town teams technical technique techniques term terminology tests than them themes things third those through time timescales timing together topics track
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: