The Art of Deception Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentari...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken; Indianapolis, Indiana :
Wiley
2002.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627026706719 |
Tabla de Contenidos:
- THE ART OF DECEPTION; Social Engineering; Contents; Foreword; Preface; Introduction; PART 1: behind the scenes; Chapter 1: Security's Weakest Link; THE HUMAN FACTOR; A CLASSIC CASE OF DECEPTION; THE NATURE OF THE THREAT; ABUSE OF TRUST; TERRORISTS AND DECEPTION; ABOUT THIS BOOK; PART 2: the art of the attacker; Chapter 2: When Innocuous Information Isn't; Chapter 3: The Direct Attack: Just Asking for It; Chapter 4: Building Trust; Chapter 5: "Let Me Help You"; Chapter 6: "Can You Help Me?"; Chapter 7: Phony Sites and Dangerous Attachments; Chapter 8: Using Sympathy, Guilt, and Intimidation
- Chapter 9: The Reverse StingPART 3: intruder alert; Chapter 10: Entering the Premises; Chapter 11: Combining Technology and Social Engineering; Chapter 12: Attacks on the Entry-Level Employee; Chapter 13: Clever Cons; Chapter 14: Industrial Espionage; PART 4: raising the bar; Chapter 15: Information Security Awareness and Training; Chapter 16: Recommended Corporate Information Security Policies; Security at a Glance; Acknowledgments; Index