-
1
-
-
85024074115
-
-
http:// www.nativeintelligence.com, Visited July 2007
-
Benefits of Security Awareness and Privacy Training. (2007). http:// www.nativeintelligence.com, Visited July 2007.
-
(2007)
-
-
-
2
-
-
85023975768
-
-
http://www.isaca.org, Visited April 2007
-
COBIT Control Objectives. (2007). http://www.isaca.org, Visited April 2007.
-
(2007)
-
-
-
3
-
-
85024024693
-
-
http://www. ftc.gov/opa/2006/01/topten.shtm, Visited March 2007
-
Federal Trade Commission. (2006). Fraud Report for 2006. http://www. ftc.gov/opa/2006/01/topten.shtm, Visited March 2007.
-
(2006)
Fraud Report for 2006
-
-
-
4
-
-
85024078216
-
-
http:// itmanagement.earthweb.com/secu/article.php/1860, Visited March 2007
-
Gaudin, S. (2002). Social Engineering: The human side hacking. http:// itmanagement.earthweb.com/secu/article.php/1860, Visited March 2007.
-
(2002)
Social Engineering: The Human Side Hacking
-
-
Gaudin, S.1
-
5
-
-
79551517540
-
-
http://www.securityfocus. com/print/infocus/1860, Visited March 2007
-
Granger, S.(2006).Socialengineeringreloaded.http://www.securityfocus. com/print/infocus/1860, Visited March 2007.
-
(2006)
Socialengineeringreloaded
-
-
Granger, S.1
-
7
-
-
85024074750
-
-
http://www. computerworld.com/securitytopics/security/story/0,10801,100448,00. html
-
Hall, M. (2005). Secure the people, Computerworld. http://www. computerworld.com/securitytopics/security/story/0,10801,100448,00. html
-
(2005)
Secure the People, Computerworld
-
-
Hall, M.1
-
9
-
-
85024054734
-
-
http://www.securityforum.org/assests/ pdf/sec_stan.pdf
-
Information Security Forum's Standard of Good Practice-Standard for Information Security. (2005). http://www.securityforum.org/assests/ pdf/sec_stan.pdf
-
(2005)
-
-
-
11
-
-
85024073137
-
-
http://us.mcafee.com/VirusInfo/, Visited May 2007
-
McAfee Security Report. (2007). http://us.mcafee.com/VirusInfo/, Visited May 2007.
-
(2007)
-
-
-
14
-
-
0034804714
-
-
http://www.research.ibm.com/journal/sj/403/palmer.html, Visited March 2007
-
Palmer, C. C. (2001). Ethical hacking, IBM Systems Journal, 40: 769-780. http://www.research.ibm.com/journal/sj/403/palmer.html, Visited March 2007.
-
(2001)
Ethical Hacking, IBM Systems Journal
, vol.40
, pp. 769-780
-
-
Palmer, C.C.1
-
15
-
-
85024021351
-
-
http://www.ponemon.org, Visited July 2007
-
Ponemon Institute. (2007). http://www.ponemon.org, Visited July 2007.
-
(2007)
-
-
-
16
-
-
85024054250
-
-
April 20) http://www.privacyrights. org/chronDatabreaches.htm
-
Privacy Rights Clearing House. (2005, April 20) http://www.privacyrights. org/chronDatabreaches.htm
-
(2005)
-
-
-
18
-
-
85024052346
-
-
http://www.schneier.com/blog/archives/2006/09/ what_is_a_hacke.html, Visited October 2007
-
Schneier, B. (2006). http://www.schneier.com/blog/archives/2006/09/ what_is_a_hacke.html, Visited October 2007.
-
(2006)
-
-
Schneier, B.1
-
20
-
-
85024032729
-
-
http://www.searchsecurity.techtarget.com/ sDefinition/0, sid14_gci531120,00.html
-
Social Engineering. (2005). http://www.searchsecurity.techtarget.com/ sDefinition/0, sid14_gci531120,00.html
-
(2005)
-
-
-
21
-
-
85023967887
-
-
http://www.infosecwriters.com/text_resources/pdf/Social_ Engineering_Can_Organizations_Win.pdf
-
Turner, T. (2005) Social Engineering-Can Organizations Win the Battle? http://www.infosecwriters.com/text_resources/pdf/Social_ Engineering_Can_Organizations_Win.pdf
-
(2005)
Social Engineering-Can Organizations Win the Battle?
-
-
Turner, T.1
|