04.10.2013 Views

Smart Cards - CES

Smart Cards - CES

Smart Cards - CES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Attacking <strong>Smart</strong> <strong>Cards</strong><br />

Social Engineering Attacks<br />

In computer security systems, this type of attack is usually<br />

the most successful, especially when the security technology<br />

is properly implemented and configured.<br />

Usually, these attacks rely on the faults in human beings.<br />

An example of a social engineering attack has a hacker<br />

impersonating a network service technician.<br />

The serviceman approaches a low-level employee and<br />

requests their password for network servicing purposes.<br />

Folie 51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!