Title :
Social engineering: The silent attack
Author :
C. E. L?pez Grande;R. S. Guadr?n
Author_Institution :
Alta Disponibilidad: Cloud Computing, Virtualizaci?n y Seguridad de la universidad Tecnol?gica de El Salvador, Centroam?rica
Abstract :
The IT security in an organization depends in great measure on the acquisition and proper hardware configuration designed for this purpose, in addition, have a highly qualified staff to perform such tasks safely. However, organizations forget that the weakest link in their infrastructure are users of computer systems and services. It is believed that the most secure server is one that is kept turned off, but that´s not true, while exist a user who can turn it on.
Keywords :
"Malware","Organizations","Hardware","Computer hacking","Software","Extraterrestrial measurements"
Conference_Titel :
Central American and Panama Convention (CONCAPAN XXXV), 2015 IEEE Thirty Fifth
DOI :
10.1109/CONCAPAN.2015.7428452