Title : 
Social engineering: The silent attack
         
        
            Author : 
C. E. L?pez Grande;R. S. Guadr?n
         
        
            Author_Institution : 
Alta Disponibilidad: Cloud Computing, Virtualizaci?n y Seguridad de la universidad Tecnol?gica de El Salvador, Centroam?rica
         
        
        
        
        
            Abstract : 
The IT security in an organization depends in great measure on the acquisition and proper hardware configuration designed for this purpose, in addition, have a highly qualified staff to perform such tasks safely. However, organizations forget that the weakest link in their infrastructure are users of computer systems and services. It is believed that the most secure server is one that is kept turned off, but that´s not true, while exist a user who can turn it on.
         
        
            Keywords : 
"Malware","Organizations","Hardware","Computer hacking","Software","Extraterrestrial measurements"
         
        
        
            Conference_Titel : 
Central American and Panama Convention (CONCAPAN XXXV), 2015 IEEE Thirty Fifth
         
        
        
            DOI : 
10.1109/CONCAPAN.2015.7428452