Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10341416 | Computers & Security | 2005 | 5 Pages |
Abstract
Social engineering attacks are well-known to prey on human weaknesses. Besides these weaknesses, humans insist on eating, sleeping, and partaking in non-work activities. On a global scale, work schedules combined with IT policies leave large windows of vulnerability - but how large? We examine calendar data through the year 2010 and locate the longest vulnerability windows which could be exploited by well-timed attacks by malicious software. The same data can be analyzed to solve a related problem: determining the best times to release software patches.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Nathan Friess, Ryan Vogt, John Aycock,