Abstract | As we have seen in a previous chapter [1], any security system is only as secure as its weakest link. Invariably, because of their social nature (and because of their human nature), the weakest links are often humans [2]. Thus, passwords get written on post-it notes and stuck to computer screens, or they become cycles of familiar words and numbers. In addition, social engineering succeeds in gaining inappropriate entry into supposedly secure systems because people will say things they're not supposed to, often to complete strangers who they just ‘like.' Also, security systems are often turned off because they're too difficult to use, obscure, or downright impossible to comprehend for mere mortals [3]. |
---|