Information Security Technology? Don't Rely on It. A Case Study in Social Engineering.
Ira S. WinklerBrian DealyPublished in: USENIX Security Symposium (1995)
Keyphrases
- information security
- information security management
- technical issues
- case study
- countermeasures
- information systems
- security issues
- intrusion detection
- smart card
- network security
- security requirements
- social networks
- security level
- engineering design
- information assurance
- artificial intelligence
- data processing
- senior management
- security risks
- cyber defense
- computer systems
- risk assessment
- risk analysis
- smart grid
- cost effective
- access control
- e government
- low cost