Total Security
Managing Users
Often violate security procedures, making technical security worthless
Social engineering: attacker tricks user into violating security procedures
Previous slide
Next slide
Back to first slide
View graphic version