O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
10
Low Tech: Social Engineering and Physical Security
In this chapter you will
•  Define social engineering
•  Describe the different types of social engineering attacks
•  Describe insider attacks, reverse social engineering, dumpster diving, social networking, and URL obfuscation
•  Describe phishing attacks and countermeasures
•  List social engineering countermeasures
•  Describe physical security measures
image
As the story goes, a large truck was barreling down a highway one day carrying equipment needed to complete a major public safety project. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required