Human exploits in cyber security

View/ Open
Date
2018Author
Owino, Michael Ogada
Koome, Ian
Oyuga, Victor
Metadata
Show full item recordAbstract
Hackers build trust to gain access to information systems. It takes more time to build trust. Attack vectors –vishing, tailgating, pre-texting (making a situation happen so the victim initiates contact)
Collections
- SICT 2018 [12]