O'Reilly logo

Securing Intellectual Property by Information Security

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Case Study - The Mysterious Social Engineering Attacks on Entity X

Introduction

Social engineering, the practice of conning people into sharing sensitive information, be it in everyday person-to-person interaction, or via cyber interconnectivity, is a real security threat that has evolved in sophistication and broadened in scope over the decade we have been both writing about it and training people how to thwart it. Unfortunately, in most organizations, countermeasures against social engineering have not kept pace, and thus the adversaries to the enterprise continue to stretch their lead and put in danger the intellectual properties of those ill-prepared corporations.

Most organizations acknowledge it as a problem, but treat it as ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required