From f4499ce6540402d6a7aeecb5b39f4ea2052740a9 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Sun, 24 Jul 2022 13:28:15 +1200 Subject: [PATCH] vault backup: 2022-07-24 13:28:15 --- ...03-threats-social-engineering-and-failures.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/content/notes/03-threats-social-engineering-and-failures.md b/content/notes/03-threats-social-engineering-and-failures.md index d5ac5f96d..3efe12f8f 100644 --- a/content/notes/03-threats-social-engineering-and-failures.md +++ b/content/notes/03-threats-social-engineering-and-failures.md @@ -60,3 +60,19 @@ security is a never ending arms race. Security is improving but so are the numbe ## espionage or trespass - unauthorized attempts to gain illegal access to information +- competitive intelligence vs industrial espionage vs cyber terrorism +- shoulder surfing +- controls mark the virtual boundaries of an organisations + - controls oftentimes let trespassers know they are encroaching on an organizations cyberspace + - hackers use skill, guile, or fraud, to bypass controls protecting others information + - expert + - develop scripts and exploits + - master of many skills + - of create software (malware etc) and share with others + - minority + - novice + - script kiddies + - more common + - use scripts written by experts + - do not understand the systems the are hacking + -