Low Tech: Social Engineering and Physical Security

In this chapter you will

•  Define social engineering

•  Describe different types of social engineering techniques and attacks

•  Describe identity theft

•  List social engineering countermeasures

•  Describe physical security measures

As the story goes, a large truck was barreling down a highway one day carrying equipment needed to complete a major public safety project. The deadline was tight, and the project would be doomed to failure if the parts were delayed for too long. As it journeyed down the road, the truck came to a tunnel and was forced to a stop—the overhead clearance was just inches too short, not allowing the truck to pass through, and there was no way around the tunnel. ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.