Gaining access to
all by exploiting human psychology
in the office
on the phone
all posing as an IT person leading them to give their passwords over
how to protect yourself from social engineering
train people on security awareness
provide a detailed briefing on the latest online fraud techniques to key staff
review separation of duties for financial transfers and other important transactions like sensitive data and data in bulk
review and test the incident management
protection of computer systems from:
disruption or misdirection of services
field is more important as more wireless and bluetooth becomes the most 'reliable'
any activity designed to protect the usability and integrity of your network and data.
It includes both hardware and software technologies.