The Art of Deception: Controlling the Human Element of Security
Rate it:
Open Preview
Kindle Notes & Highlights
7%
Flag icon
Because the human factor is truly security's weakest link. Security is too often merely an illusion, an illusion sometimes made even worse when gullibility, naïveté, or ignorance come into play.
7%
Flag icon
“Security is not a product, it's a process.” Moreover, security is not a technology problem—it's a people and management problem.
7%
Flag icon
Cracking the human firewall is often easy, requires no investment beyond the cost of a phone call, and involves minimal risk.
8%
Flag icon
Those who fail to plan for a security incident are planning for failure.
8%
Flag icon
While amateur computer intruders simply go for quantity, the professionals target information of quality and value.
8%
Flag icon
Most people go on the assumption that they will not be deceived by others, based upon a
8%
Flag icon
belief that the probability of being deceived is very low; the attacker, understanding this common belief, makes his request sound so reasonable that it raises no suspicion, all the while exploiting the victim's trust.
9%
Flag icon
We've come to accept the need for defensive driving; it's time to accept and learn the practice of defensive computing.
9%
Flag icon
The challenge is to achieve a balance between security and productivity.
9%
Flag icon
We would live a difficult life if we had to be always on our guard, mistrustful of others, concerned that we might become the dupe of someone trying to take advantage of us. In
11%
Flag icon
A personal question is like a land mine—some people step right over it and never notice; for other people, it blows up and sends them scurrying for safety. So if I ask a personal question and she answers the question and the tone of her voice doesn't change, that means she probably isn't skeptical about the nature of the request.
11%
Flag icon
One more thing a good PI knows: Never end the conversation after getting the key information. Another
11%
Flag icon
gaining access to information that a company employee treats as innocuous, when it isn't.
11%
Flag icon
He knew the common tactic of burying the key questions among innocent ones.
13%
Flag icon
A well-thought-out information security policy, combined with proper education and training, will dramatically increase employee awareness about the proper handling of corporate business information. A data classification policy will help you to implement proper controls with respect to disclosing information. Without a data classification policy, all internal information must be considered confidential, unless otherwise specified.
16%
Flag icon
Security training needs to emphasize: When in doubt, verify, verify, verify.