Social engineering

Describe how social engineering can be used to obtain physical access to a building or technological access to a network database containing classified information

BOOK: Curtis, G. & McBride, R. (2011). Proactive Security Administration, 2nd. Ed.; ISBN-
13: 9780135071502

Our customer support team is here to answer your questions. Ask us anything!