- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 105字
- 2021-06-30 19:16:00
Tailgating
This is the least common social engineering attack and is not as technically advanced as the ones we've discussed previously. However, it does have a significant success rate. Attackers use this method to gain entry into restricted premises or parts of buildings. Most organizational premises have electronic access control and users normally require biometric or RFID cards to be allowed in. An attacker will walk behind an employee that has legitimate access and enter behind them. At times, the attacker may ask an employee to borrow their RFID card, or may gain entry by using a fake card under the guise of accessibility problems.
推薦閱讀
- pcDuino開發實戰
- 構建高可用Linux服務器(第4版)
- Haskell Financial Data Modeling and Predictive Analytics
- Ubuntu Linux操作系統
- Linux性能優化
- 循序漸進學Docker
- Windows Vista融會貫通
- 深入淺出Node.js
- INSTANT Migration from Windows Server 2008 and 2008 R2 to 2012 How-to
- 跟老男孩學Linux運維:Shell編程實戰
- Windows Vista終極技巧金典
- 統信UOS應用開發進階教程
- Less Web Development Essentials
- Android NDK Beginner's Guide
- 辦公自動化教程(Windows7+Office2010)