메뉴 건너뛰기




Volumn 16, Issue 6, 2007, Pages 302-314

On the anatomy of human hacking

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85015895149     PISSN: 1065898X     EISSN: None     Source Type: Journal    
DOI: 10.1080/10658980701747237     Document Type: Article
Times cited : (45)

References (21)
  • 1
    • 85024074115 scopus 로고    scopus 로고
    • http:// www.nativeintelligence.com, Visited July 2007
    • Benefits of Security Awareness and Privacy Training. (2007). http:// www.nativeintelligence.com, Visited July 2007.
    • (2007)
  • 2
    • 85023975768 scopus 로고    scopus 로고
    • http://www.isaca.org, Visited April 2007
    • COBIT Control Objectives. (2007). http://www.isaca.org, Visited April 2007.
    • (2007)
  • 3
    • 85024024693 scopus 로고    scopus 로고
    • http://www. ftc.gov/opa/2006/01/topten.shtm, Visited March 2007
    • Federal Trade Commission. (2006). Fraud Report for 2006. http://www. ftc.gov/opa/2006/01/topten.shtm, Visited March 2007.
    • (2006) Fraud Report for 2006
  • 4
    • 85024078216 scopus 로고    scopus 로고
    • http:// itmanagement.earthweb.com/secu/article.php/1860, Visited March 2007
    • Gaudin, S. (2002). Social Engineering: The human side hacking. http:// itmanagement.earthweb.com/secu/article.php/1860, Visited March 2007.
    • (2002) Social Engineering: The Human Side Hacking
    • Gaudin, S.1
  • 5
    • 79551517540 scopus 로고    scopus 로고
    • http://www.securityfocus. com/print/infocus/1860, Visited March 2007
    • Granger, S.(2006).Socialengineeringreloaded.http://www.securityfocus. com/print/infocus/1860, Visited March 2007.
    • (2006) Socialengineeringreloaded
    • Granger, S.1
  • 7
    • 85024074750 scopus 로고    scopus 로고
    • http://www. computerworld.com/securitytopics/security/story/0,10801,100448,00. html
    • Hall, M. (2005). Secure the people, Computerworld. http://www. computerworld.com/securitytopics/security/story/0,10801,100448,00. html
    • (2005) Secure the People, Computerworld
    • Hall, M.1
  • 9
    • 85024054734 scopus 로고    scopus 로고
    • http://www.securityforum.org/assests/ pdf/sec_stan.pdf
    • Information Security Forum's Standard of Good Practice-Standard for Information Security. (2005). http://www.securityforum.org/assests/ pdf/sec_stan.pdf
    • (2005)
  • 11
    • 85024073137 scopus 로고    scopus 로고
    • http://us.mcafee.com/VirusInfo/, Visited May 2007
    • McAfee Security Report. (2007). http://us.mcafee.com/VirusInfo/, Visited May 2007.
    • (2007)
  • 14
    • 0034804714 scopus 로고    scopus 로고
    • http://www.research.ibm.com/journal/sj/403/palmer.html, Visited March 2007
    • Palmer, C. C. (2001). Ethical hacking, IBM Systems Journal, 40: 769-780. http://www.research.ibm.com/journal/sj/403/palmer.html, Visited March 2007.
    • (2001) Ethical Hacking, IBM Systems Journal , vol.40 , pp. 769-780
    • Palmer, C.C.1
  • 15
    • 85024021351 scopus 로고    scopus 로고
    • http://www.ponemon.org, Visited July 2007
    • Ponemon Institute. (2007). http://www.ponemon.org, Visited July 2007.
    • (2007)
  • 16
    • 85024054250 scopus 로고    scopus 로고
    • April 20) http://www.privacyrights. org/chronDatabreaches.htm
    • Privacy Rights Clearing House. (2005, April 20) http://www.privacyrights. org/chronDatabreaches.htm
    • (2005)
  • 18
    • 85024052346 scopus 로고    scopus 로고
    • http://www.schneier.com/blog/archives/2006/09/ what_is_a_hacke.html, Visited October 2007
    • Schneier, B. (2006). http://www.schneier.com/blog/archives/2006/09/ what_is_a_hacke.html, Visited October 2007.
    • (2006)
    • Schneier, B.1
  • 20
    • 85024032729 scopus 로고    scopus 로고
    • http://www.searchsecurity.techtarget.com/ sDefinition/0, sid14_gci531120,00.html
    • Social Engineering. (2005). http://www.searchsecurity.techtarget.com/ sDefinition/0, sid14_gci531120,00.html
    • (2005)
  • 21
    • 85023967887 scopus 로고    scopus 로고
    • http://www.infosecwriters.com/text_resources/pdf/Social_ Engineering_Can_Organizations_Win.pdf
    • Turner, T. (2005) Social Engineering-Can Organizations Win the Battle? http://www.infosecwriters.com/text_resources/pdf/Social_ Engineering_Can_Organizations_Win.pdf
    • (2005) Social Engineering-Can Organizations Win the Battle?
    • Turner, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.