O'Reilly logo

Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Physical Security and Social Engineering

This chapter covers the following topics:

Image Physical Security: Much of this book has addressed attacks against logical security, but physical security is just as important. Penetration testing against physical targets is a common testing component.

Image Social Engineering: Most of the biggest attacks that have occurred over the past 10 to 15 years have been either physical/social or logical/social components. Social engineering is a common attack vector.

This chapter differs from previous chapters ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required