- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 105字
- 2021-06-30 19:16:00
Tailgating
This is the least common social engineering attack and is not as technically advanced as the ones we've discussed previously. However, it does have a significant success rate. Attackers use this method to gain entry into restricted premises or parts of buildings. Most organizational premises have electronic access control and users normally require biometric or RFID cards to be allowed in. An attacker will walk behind an employee that has legitimate access and enter behind them. At times, the attacker may ask an employee to borrow their RFID card, or may gain entry by using a fake card under the guise of accessibility problems.
推薦閱讀
- 每天5分鐘玩轉(zhuǎn)Kubernetes
- Mobile-first Bootstrap
- Linux從零開始學(xué)(視頻教學(xué)版)
- UNIX操作系統(tǒng)設(shè)計(jì)
- PLC控制系統(tǒng)應(yīng)用與維護(hù)
- Linux網(wǎng)絡(luò)內(nèi)核分析與開發(fā)
- Java EE 8 Design Patterns and Best Practices
- Windows 7中文版從入門到精通(修訂版)
- Mastering Reactive JavaScript
- Linux內(nèi)核設(shè)計(jì)的藝術(shù):圖解Linux操作系統(tǒng)架構(gòu)設(shè)計(jì)與實(shí)現(xiàn)原理
- Social Data Visualization with HTML5 and JavaScript
- Kali Linux高級(jí)滲透測(cè)試(原書第3版)
- 鴻蒙HarmonyOS手機(jī)應(yīng)用開發(fā)實(shí)戰(zhàn)
- 微軟360度
- 電子商務(wù)系統(tǒng)建設(shè)與管理