Human exploits in cyber security

dc.contributor.authorOwino, Michael Ogada
dc.contributor.authorKoome, Ian
dc.contributor.authorOyuga, Victor
dc.date.accessioned2019-03-18T12:55:05Z
dc.date.available2019-03-18T12:55:05Z
dc.date.issued2018
dc.description.abstractHackers build trust to gain access to information systems. It takes more time to build trust. Attack vectors –vishing, tailgating, pre-texting (making a situation happen so the victim initiates contact)en_US
dc.identifier.urihttp://hdl.handle.net/11071/6422
dc.language.isoenen_US
dc.publisherStrathmore Universityen_US
dc.subjectCyber securityen_US
dc.subjectICTen_US
dc.subjectSocial engineeringen_US
dc.subjectHackersen_US
dc.titleHuman exploits in cyber securityen_US
dc.typePresentationen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Human Exploits in cyber security.pdf
Size:
651.58 KB
Format:
Adobe Portable Document Format
Description:
2018
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:
Collections