Site MapHelpFeedbackChapter Summary
Chapter Summary
(See related pages)

People—A Security Problem

  • No matter how advanced security technology is, it will ultimately be deployed in an environment where the human element may be its greatest weakness.


  • A significant portion of employee-created security problems arise from poor security practices.


  • For many years, computer intruders have relied on users selecting poor passwords to help them in their attempts to gain unauthorized access to a system or network.


  • Attackers know that employees are frequently very busy and don’t stop to think about security. They may attempt to exploit this work characteristic through piggybacking or shoulder surfing.


  • One common way to find useful information (if the attacker is in the vicinity of the target) is to go through the target’s trash looking for bits of information that could be useful to a penetration attempt.


  • Organizations should have a policy that restricts the ability of normal users to install software and new hardware on their systems.


  • Contractors, consultants, and partners may frequently not only have physical access to the facility but they may also have network access. Other groups that are given unrestricted, and unobserved, access to a facility are nighttime custodial crewmembers and security guards. Both are potential security problems.


  • Social engineering is a technique in which the attacker uses various deceptive practices to obtain information which the attacker would normally not be privileged to, or to convince the target to do something they normally wouldn’t.


  • In reverse social engineering, the attacker hopes to convince the target to initiate contact.


People as a Security Tool

  • An interesting paradox when speaking of social engineering attacks is that people are not only the biggest problem and security risk, but they are also the best line of defense against a social engineering attack.


  • The single most effective method to counter potential social engineering attacks, after establishment of the organization’s security goals and policies, is an active security awareness program.









Security+ and BeyondOnline Learning Center

Home > Chapter 4 > Chapter Summary