- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 105字
- 2021-06-30 19:16:00
Tailgating
This is the least common social engineering attack and is not as technically advanced as the ones we've discussed previously. However, it does have a significant success rate. Attackers use this method to gain entry into restricted premises or parts of buildings. Most organizational premises have electronic access control and users normally require biometric or RFID cards to be allowed in. An attacker will walk behind an employee that has legitimate access and enter behind them. At times, the attacker may ask an employee to borrow their RFID card, or may gain entry by using a fake card under the guise of accessibility problems.
推薦閱讀
- Linux運維之道(第3版)
- Mastering ElasticSearch
- Linux操作系統基礎
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Implementing Cisco UCS Solutions
- Learning Bootstrap
- 網絡操作系統教程:Windows Server 2016管理與配置
- 蘋果OS X Mavericks 10.9應用大全
- AutoCAD 2014中文版從入門到精通
- 從實踐中學習Kali Linux無線網絡滲透測試
- INSTANT Galleria Howto
- Troubleshooting Docker
- Linux 從入門到項目實踐(超值版)
- 嵌入式微系統
- 電腦辦公(Windows 10 + Office 2016)入門與提高(超值版)