Human exploits in cyber security

Loading...
Thumbnail Image

Date

Authors

Owino, Michael Ogada
Koome, Ian
Oyuga, Victor

Journal Title

Journal ISSN

Volume Title

Publisher

Strathmore University

Abstract

Hackers build trust to gain access to information systems. It takes more time to build trust. Attack vectors –vishing, tailgating, pre-texting (making a situation happen so the victim initiates contact)

Description

Citation

Collections

Endorsement

Review

Supplemented By

Referenced By