CATEGORY: CyberBook
19.1 – Social Engineering Techniques
We all are aware of the type of attacker who leverages his technical skill to penetrate protected computer systems and compromise critical information. We...
19.0 – Human Security
Introduction to "Human Security"
Human security is about protecting people’s freedoms. It requires defending people from significant and invasive threats, and allowing them to take...
18.4 – Theft and Locks Picking
Hardware Theft (Laptop/Hard disk/CD/DVD/USB Drives)
Hardware theft is referred to as the act of stealing computer equipment such as CD, DVD, USB drives, hard disk...
18.3 – Physical Security Checklist
Nowadays, physical security is big business. According to market research, the hardware sector of the industry alone is worth about $36 billion and is...
18.2 – Planning and Executing
Planning & Executing Physical Security Test
Developing a physical security policy for your company requires planning. Without appropriate planning, there are chances that execution is...