SØG - mellem flere end 8 millioner bøger:
Viser: Social Engineering: The Art of Human Hacking
Social Engineering: The Art of Human Hacking
Christopher Hadnagy og Paul Wilson
(2010)
Sprog: Engelsk
Detaljer om varen
- Paperback: 416 sider
- Udgiver: John Wiley & Sons, Incorporated (December 2010)
- Forfattere: Christopher Hadnagy og Paul Wilson
- ISBN: 9780470639535
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.
Kevin Mitnick'one of the most famous social engineers in the world'popularized the term ?social engineering.' He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.
- Examines social engineering, the science of influencing a target to perform a desired task or divulge information
- Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
- Reveals vital steps for preventing social engineering threats
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers'now you can do your part by putting to good use the critical information within its pages.
1: Hacking the DMV 300 Mitnick Case Study
2: Hacking the Social Security Administration 306 Hadnagy Case Study
1: The Overconfident CEO 310 Hadnagy Case Study
2: The Theme Park Scandal 317 Top-Secret Case Study
1: Mission Not Impossible 322 Top-Secret Case Study
2: Social Engineering a Hacker 329 Why Case Studies Are Important 337 Summary 338 9 Prevention and Mitigation 339 Learning to Identify Social Engineering Attacks 340 Creating a Personal Security Awareness Culture 341 Being Aware of the Value of the Information You Are Being Asked For 344 Keeping Software Updated 347 Developing Scripts 348 Learning from Social Engineering Audits 348 Concluding Remarks 354 Summary 361 Index 363