The art of social engineering uncover the secrets behind the human dynamics in cybersecurity
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guide Key Features Gain insights into the open source intelligence (OSINT) methods used by attackers to harvest data Understand...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing
2023.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009804922706719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Foreword
- Contributors
- Table of Contents
- Preface
- Part 1: Understanding Social Engineering
- Chapter 1: The Psychology behind Social Engineering
- Technical requirements
- Disclaimer
- Understanding the art of manipulation
- Examining the six principles of persuasion
- Developing rapport
- Using appropriate body language
- Using your knowledge to help
- Complimenting
- Supporting other points of view
- Leveraging empathy
- Leveraging influence for defensive security
- Summary
- Further reading
- Chapter 2: Understanding Social Engineering
- Technical requirements
- Detecting social engineering attacks
- Social media attacks
- The lost passport
- The federal government grant
- Romance scam
- Fake investment
- Fake advertisements
- Social engineering and the crypto scam
- Summary
- Chapter 3: Common Scam Attacks
- Technical requirements
- What is a scam?
- The Nigerian scam (419)
- The history of the scam
- Identifying the Nigerian scam
- Types of Nigerian scams
- Funny Nigerian scams
- Avoiding these scams
- Other scams
- The investor scam
- The Business Email Compromise scam
- Fraud compensation
- Scambaiting
- Summary
- Chapter 4: Types of Social Engineering Attacks
- Technical requirements
- Disclaimer
- Phishing attacks
- History of phishing attacks
- Famous phishing attacks
- Types of phishing attacks
- Baiting
- Physical baiting
- Cyber baiting
- Protecting yourself against baiting
- Dumpster diving
- Tailgating
- Quid pro quo
- Free tech support
- Free software to download
- How to protect yourself against quid pro quo attacks
- Pretexting
- Fake job offers
- False charities
- Watering hole
- Crypto mining
- Summary
- Further reading
- Part 2: Enhanced Social Engineering Attacks
- Chapter 5: Enhanced Social Engineering Attacks
- Technical requirements
- Disclaimer
- Targeted attacks
- Identifying high-value targets
- OSINT
- OSINT tools
- OSINT methods
- OSINT use cases
- Web-based attacks
- Fake logins
- Fake updates
- Scareware
- Fake pages
- Magic-ware
- Hacking-ware
- Gaming-based attacks
- Forum-based attacks
- Adware
- Summary
- Chapter 6: Social Engineering and Social Network Attacks
- Disclaimer
- Social engineering through mobile applications
- Malicious apps and app-based attacks
- Exploiting app permissions for data access
- The challenges in identifying and mitigating such attacks
- Social engineering via social networks
- Clickbait attack
- WhatsApp-based attacks
- Instagram-based attacks
- Other attacks
- Sextortion
- Fake news attacks
- Forex scams
- Summary
- Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks
- Technical requirements
- Artificial intelligence in social engineering attacks
- The growing role of AI in social engineering
- AI-driven social engineering techniques