slides

Methodology of Counteraction of Social Engineering on Objects of Information Activity

Abstract

There are many sources of threats to enterprise information and cybersecurity. Enterprise personnel are always involved in the storage and processing of information. Therefore, it is important to consider the human factor as a real existing vulnerability in the information security of the enterprise. Usually for the convenience of people, most public Wi-Fi networks are left open, making them a good place to conduct various attacks. This fact is what inspired this study

    Similar works