The art of social engineering uncover the secrets behind the human dynamics in cybersecurity

Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guide Key Features Gain insights into the open source intelligence (OSINT) methods used by attackers to harvest data Understand...

Descripción completa

Detalles Bibliográficos
Otros Autores: Bravo, Cesar (Cybersecurity expert), author (author), Toska, Desilda, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham : Packt Publishing 2023.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009804922706719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Understanding Social Engineering
  • Chapter 1: The Psychology behind Social Engineering
  • Technical requirements
  • Disclaimer
  • Understanding the art of manipulation
  • Examining the six principles of persuasion
  • Developing rapport
  • Using appropriate body language
  • Using your knowledge to help
  • Complimenting
  • Supporting other points of view
  • Leveraging empathy
  • Leveraging influence for defensive security
  • Summary
  • Further reading
  • Chapter 2: Understanding Social Engineering
  • Technical requirements
  • Detecting social engineering attacks
  • Social media attacks
  • The lost passport
  • The federal government grant
  • Romance scam
  • Fake investment
  • Fake advertisements
  • Social engineering and the crypto scam
  • Summary
  • Chapter 3: Common Scam Attacks
  • Technical requirements
  • What is a scam?
  • The Nigerian scam (419)
  • The history of the scam
  • Identifying the Nigerian scam
  • Types of Nigerian scams
  • Funny Nigerian scams
  • Avoiding these scams
  • Other scams
  • The investor scam
  • The Business Email Compromise scam
  • Fraud compensation
  • Scambaiting
  • Summary
  • Chapter 4: Types of Social Engineering Attacks
  • Technical requirements
  • Disclaimer
  • Phishing attacks
  • History of phishing attacks
  • Famous phishing attacks
  • Types of phishing attacks
  • Baiting
  • Physical baiting
  • Cyber baiting
  • Protecting yourself against baiting
  • Dumpster diving
  • Tailgating
  • Quid pro quo
  • Free tech support
  • Free software to download
  • How to protect yourself against quid pro quo attacks
  • Pretexting
  • Fake job offers
  • False charities
  • Watering hole
  • Crypto mining
  • Summary
  • Further reading
  • Part 2: Enhanced Social Engineering Attacks
  • Chapter 5: Enhanced Social Engineering Attacks
  • Technical requirements
  • Disclaimer
  • Targeted attacks
  • Identifying high-value targets
  • OSINT
  • OSINT tools
  • OSINT methods
  • OSINT use cases
  • Web-based attacks
  • Fake logins
  • Fake updates
  • Scareware
  • Fake pages
  • Magic-ware
  • Hacking-ware
  • Gaming-based attacks
  • Forum-based attacks
  • Adware
  • Summary
  • Chapter 6: Social Engineering and Social Network Attacks
  • Disclaimer
  • Social engineering through mobile applications
  • Malicious apps and app-based attacks
  • Exploiting app permissions for data access
  • The challenges in identifying and mitigating such attacks
  • Social engineering via social networks
  • Clickbait attack
  • WhatsApp-based attacks
  • Instagram-based attacks
  • Other attacks
  • Sextortion
  • Fake news attacks
  • Forex scams
  • Summary
  • Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks
  • Technical requirements
  • Artificial intelligence in social engineering attacks
  • The growing role of AI in social engineering
  • AI-driven social engineering techniques