Social Engineering in IT Security: Tools, Tactics, and Techniques
(Sprache: Englisch)
Cutting-edge social engineering testing techniques"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--SlashdotConduct ethical social engineering tests to identify an organization's susceptibility...
Leider schon ausverkauft
versandkostenfrei
Buch
40.06 €
Produktdetails
Produktinformationen zu „Social Engineering in IT Security: Tools, Tactics, and Techniques “
Klappentext zu „Social Engineering in IT Security: Tools, Tactics, and Techniques “
Cutting-edge social engineering testing techniques"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--SlashdotConduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.- Explore the evolution of social engineering, from the classic con artist to the modern social engineer
- Understand the legal and ethical aspects of performing a social engineering test
- Find out why social engineering works from a victim's point of view
- Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
- Gather information through research and reconnaissance
- Create a credible social engineering scenario
- Execute both on-site and remote social engineering tests
- Write an effective social engineering report
- Learn about various tools, including software, hardware, and on-site tools
- Defend your organization against social engineering attacks
Inhaltsverzeichnis zu „Social Engineering in IT Security: Tools, Tactics, and Techniques “
1. Social Engineering's Evolution2. The Ethical and Legal Aspects of Social Engineering
3. Practical Social Engineering and Why it Works
4. Planning Your Social Engineering Test
5. Reconnaissance & Information Gathering
6. Scenario Creation & Testing
7. Executing Your Social Engineering Test
8. Reporting
9. The Social Engineering Arsenal & Tools of the Trade
10. Defense Against Social Engineering Attacks
11. Tomorrow's Social Engineering Attacks
Autoren-Porträt von Sharon Conheady
Sharon Conheady is the Director of Social Engineering & penetration testing at First Defence Information Scurity in the UK. Conheady holds a degree in Computer Science from Trinity College Dublin and a MSC in Information Security from Westminster University. Prior to joining First Defense, she served as a Professional Services Director at the vulnerability management firm Outpost24, after serving several years as a penetration tester with Ernst & young. Conheady leads social engineering training seminars and has spoken around the world about social engineering at conferences that include Deepsec, Recon, CONFidence, ISSE, ISF, and SANS Secure Europe.
Bibliographische Angaben
- Autor: Sharon Conheady
- 254 Seiten, Maße: 18,5 x 22,9 cm, Kartoniert (TB), Englisch
- Verlag: Osborne
- ISBN-10: 0071818464
- ISBN-13: 9780071818469
- Erscheinungsdatum: 04.08.2014
Sprache:
Englisch
Kommentar zu "Social Engineering in IT Security: Tools, Tactics, and Techniques"
0 Gebrauchte Artikel zu „Social Engineering in IT Security: Tools, Tactics, and Techniques“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Social Engineering in IT Security: Tools, Tactics, and Techniques".
Kommentar verfassen