The Art of Deception. Kevin D Mitnick

T H E A R T O F D E C E P T I O N

Controlling the Human Element of Security

KEVIN D. MITNICK
& William L. Simon
Foreword by Steve Wozniak

E-books Shop
The Art of Deception
Technological security leaves major gaps that people like Kevin can help
us close. Read this book and you may finally realize that we all need to
turn to the Mitnick's among us for guidance.
-Steve Wozniak

================================
Social Engineering uses influence and persuasion to deceive people
by convincing them that the social engineer is someone he is not,
or by manipulation. As a result, the social engineer is able to take
advantage of people to obtain information with or without the use of technology.
======================


Contents

Foreword
Preface
Introduction
Part 1 Behind the Scenes
Chapter 1 Security's Weakest Link
Part 2 The Art of the Attacker
Chapter 2 When Innocuous Information Isn't
Chapter 3 The Direct Attack: Just Asking for it
Chapter 4 Building Trust
Chapter 5 "Let Me Help You"
Chapter 6 "Can You Help Me?"
Chapter 7 Phony Sites and Dangerous Attachments
Chapter 8 Using Sympathy, Guilt and Intimidation
Chapter 9 The Reverse Sting
Part 3 Intruder Alert
Chapter 10 Entering the Premises
Chapter 11 Combining Technology and Social Engineering
Chapter 12 Attacks on the Entry-Level Employee
Chapter 13 Clever Cons
Chapter 14 Industrial Espionage
Part 4 Raising the Bar
Chapter 15 Information Security Awareness and Training
Chapter 16 Recommended Corporate Information Security Policies
Security at a Glance
Sources
Acknowledgments

-----------------------------------------------------------------------------------------------------

This book contains a wealth of information about information security and social engineering. 
To help you find your way, here's a quick look at how this book is organized: 
In Part 1 I'll reveal security's weakest link and show you why you and your company are at risk from social engineering attacks. 
In Part 2 you'll see how social engineers toy with your trust, your desire to be helpful, your sympathy, and your human gullibility to get what they want. 
Fictional stories of typical attacks will demonstrate that social engineers can wear many hats and many faces. If you think you've never encountered one, you're probably wrong. Will you recognize a scenario you've experienced in these stories and wonder if you had a brush with social engineering? You very well might. But once you've read Chapters 2 through 9, you'll know how to get the upper hand when the next social engineer comes calling.
Part 3 is the part of the book where you see how the social engineer ups the ante, in made-up stories that show how he can step onto your corporate premises, steal the kind of secret that can make or break your company, and thwart your hi-tech security measures. The scenarios in this section will make you aware of threats that range from simple employee revenge to cyber terrorism. If you value the information that keeps your business running and the privacy of your data, you'll want to read
Chapters 10 through 14 from beginning to end.
It's important to note that unless otherwise stated, the anecdotes in this book are purely fictional.
In Part 4 I talk the corporate talk about how to prevent successful social engineering attacks on your organization. Chapter 15 provides a blueprint for a successful security-training program. And Chapter 16 might just save your neck - it's a complete security policy you can customize for your organization and implement right away to keep your company and information safe.
Finally, I've provided a Security at a Glance section, which includes checklists, tables, and charts that summarize key information you can use to help your employees foil a social engineering attack on the job. These tools also provide valuable information you can use in devising your own
security-training program. Throughout the book you'll also find several useful elements: Lingo boxes provide definitions of social engineering and computer hacker terminology; Mitnick Messages offer brief words of wisdom to help strengthen your security strategy; and notes and sidebars give interesting background or additional information.
-------------------------------------------------------------------
 Screenshot 


Purchase Now !
Just with Paypal
●▬▬▬▬▬❂❂❂▬▬▬▬▬●

Product details
 Price
 File Size
 5,319 KB
 Pages
 577 p
 File Type
 PDF format
 Title
 The Art of Deception  
 Copyright
 Kevin D Mitnick        
●▬▬▬▬▬❂❂❂▬▬▬▬▬●
●▬▬❂❂▬▬●
●▬❂▬●


═════ ═════

Previous Post Next Post