40,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
20 °P sammeln
  • Broschiertes Buch

The human user is often the main security weak link to computer networks and systems holding highly valuable data and files. Such digital assets are often the highly sought after assets by the iPredators in planning and executing the attacks. During such incidences, the iPredators often manipulate the human targets to reveal their access information unwittingly enabling them to infiltrate systems to execute the attacks. The security challenge posed by social engineering attacks is further compounded by fact that technical means alone cannot completely eliminate the human vulnerabilities…mehr

Produktbeschreibung
The human user is often the main security weak link to computer networks and systems holding highly valuable data and files. Such digital assets are often the highly sought after assets by the iPredators in planning and executing the attacks. During such incidences, the iPredators often manipulate the human targets to reveal their access information unwittingly enabling them to infiltrate systems to execute the attacks. The security challenge posed by social engineering attacks is further compounded by fact that technical means alone cannot completely eliminate the human vulnerabilities exploited by iPredators while executing the attacks. To address the social engineering attacks security threats by iPredators on users and their critical data, this study developed the iPSEAD framework for deflection of the attacks. Unlike other frameworks such as the social engineering attack framework by Mouton, Malan, and Ventor (2014), the iPSEAD framework provides a tecno-social solution to the problem based on a design that seek to reduce attacks surfaces due to the human and technological aspects associated with social engineering attacks for more secure digital access to cyberspace for all.
Autorenporträt
Ambrose Kinyanjui Muchonjo is a graduate of Mount Kenya University having graduated with Master of Science in Information Technology in 2018. He has co-authored a book in 2015. He has authored two academic research papers with peer reviewed journals, attended and presented research papers in international conferences in area IT and Cyber Security.