Chapter 10. Physical Security and Social Engineering

This chapter covers the following topics:

Image Physical Security: Much of this book has addressed attacks against logical security, but physical security is just as important. Penetration testing against physical targets is a common testing component.

Image Social Engineering: Most of the biggest attacks that have occurred over the past 10 to 15 years have been either physical/social or logical/social components. Social engineering is a common attack vector.

This chapter differs from previous chapters ...

Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.