Every legitimate user thus constitutes an unintentional insider threat to the information system's security, something which must be kept in mind when reinforcing and adapting the information system's security policy. This chapter presents some examples of attacks using social engineering techniques. It...
Unintentional insider threatHuman errorInformation securityIt is well recognized that individuals within organizations represent a significant threat to information security as they are both common targets of external attackers and can be sources of malicious behavior themselves. Notwithstanding these facts, ...