Human exploits in cyber security
dc.contributor.author | Owino, Michael Ogada | |
dc.contributor.author | Koome, Ian | |
dc.contributor.author | Oyuga, Victor | |
dc.date.accessioned | 2019-03-18T12:55:05Z | |
dc.date.available | 2019-03-18T12:55:05Z | |
dc.date.issued | 2018 | |
dc.description.abstract | Hackers build trust to gain access to information systems. It takes more time to build trust. Attack vectors –vishing, tailgating, pre-texting (making a situation happen so the victim initiates contact) | en_US |
dc.identifier.uri | http://hdl.handle.net/11071/6422 | |
dc.language.iso | en | en_US |
dc.publisher | Strathmore University | en_US |
dc.subject | Cyber security | en_US |
dc.subject | ICT | en_US |
dc.subject | Social engineering | en_US |
dc.subject | Hackers | en_US |
dc.title | Human exploits in cyber security | en_US |
dc.type | Presentation | en_US |