First page Back Continue Last page Summary Graphic
A Survey of Vulnerability and Attacks
Social Attacks
The weakest link in any Security Policy is the people who are authorized to use the computing environment.
Shoulder Surfing
- Is a process of capturing sensitive information such as user's password.
Manipulating
- By those who pretend to be System Administrator or high-level official of the organization.