Social engineering: Is security focused on the wrong problem?

Security Awareness Training and Internal Threats-Information

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What's your biggest information security concern?

    In this month's issue of Information Security magazine, we reveal the results of this year's priorities survey. Readers ranked insider threats and information leaks as their top concerns. Get tips from auditors on how to avoid audit failure and get P... 

  • Top forensics tools for tracking down cybercriminals

    Scott Levine stole more than one billion personal records and was convicted of 120 counts of unauthorized access of a protected computer. Check out the most popular forensics tools for tracking down cybercriminals. 

  • Chain of command: Inside Prudential's security management program

    Information Security's October 2003 issue examines the security management program at Prudential Financial and why it's processes and people are a rock of information security stability. Also in this issue: how to reduce insider risk, how the informa... 

  • exit interview

    An exit interview is a meeting between management representatives and someone who is leaving an organization. Businesses and other organizations such as educational institutions use exit interviews to gather useful feedback that can help guide future... 

  • security awareness training

    Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT). Regular training is particularly necessary in organizations with high turnover rates and tho... 

  • pretexting

    Pretexting is a form of social engineering in which one individual lies to obtain privileged data about another individual in order to engage in identity theft or corporate espionage. A pretext is a false motive. 

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false cr... 

  • National Computer Security Center (NCSC)

    The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure that facilities processing classified or other sensit... 

  • micro-botnet (mini-botnet or baby botnet)

    A micro-botnet, also called a mini-botnet or baby botnet, is a small network of Internet-connected computers that have been hijacked to attack specific companies or individuals within a company. 

  • Honeynet Project

    The Honeynet Project is a non-profit volunteer organization dedicated to computer security research and information sharing. 

  • single-factor authentication (SFA)

    Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user... (Continued) 

  • trusted computing

    Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications... (Continued) 

  • social engineering

    Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. 

  • See more Definitions on Security Awareness Training and Internal Threats-Information
About Security Awareness Training and Internal Threats-Information

Get advice and tips on how end user security and security awareness training can help prevent internal threats. Info is also offered on keystroke loggers, security awareness programs, and how to prevent data leakage.