Computer Security Project
Home
ABSTRACT
Cryptography has come a long way over the past years. Breaking into a server from a remote machine
is becoming more and more difficult. System administrators make it so that most systems require strong
passwords and will reject weak passwords. Current security measures such as Triple DES and DSA do a
good job of maintaining the confidentiality, integrity and availability of a given system. These are
all examples of how security methods have been built over the years to protect data. However, an often
overlooked flaw in the system is that John Doe can easily bypass these thorough security measures by
befriending the secretary at the front desk and asking her for her talented help. Yes, years of
security research beaten by a friendly smile.


Paper: Social Engineering - The Attempt of Deceive (pdf)

Paper: Social Engineering: How to use social interactions to ypass years of security work (ppt)