Unauthorised access physical penetration testing for IT security teams

The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of ne...

Descripción completa

Detalles Bibliográficos
Autor principal: Allsopp, Wil (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Chichester : Wiley 2009.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627727106719
Tabla de Contenidos:
  • Unauthorised Access; Contents; Preface; Acknowledgements; Foreword; 1 The Basics of Physical Penetration Testing; 2 Planning Your Physical Penetration Tests; 3 Executing Tests; 4 An Introduction to Social Engineering Techniques; 5 Lock Picking; 6 Information Gathering; 7 Hacking Wireless Equipment; 8 Gathering the Right Equipment; 9 Tales from the Front Line; 10 Introducing Security Policy Concepts; 11 Counter Intelligence; Appendix A: UK Law; Appendix B: US Law; Appendix C: EU Law; Appendix D: Security Clearances; Appendix E: Security Accreditations; Index