Threat of Social Engineering
What does the threat of Social Engineering consist of?
Guide to Network Security
Additional Theory on Social engineering
Many attacks do not use computers
- A hacker calls the system administrator
- A bad actor may attempt to retrieve credit card bills in the dumpster
- A black hat may send a trojan virus in an email
- A picture or movie that is downloaded can contain malicious code
Possibility of Theft
The possibility of theft is not the only way in which laptops present a security risk. The threat to your network is that a data thief who is able to enter your premises may be able to plug a laptop into
the network, crack passwords (or obtain a password via social engineering), and download data to the portable machine, which can then be easily carried away. New handheld computers are coming with more security devices built in.
For example, the Hewlett-Packard iPAQ 5555 includes biometric (fingerprint recognition) technology to prevent unauthorized users from accessing the data.