Chapter 4
The Role of People in Security
Lab Exercises
4.01 The Social-Engineer Toolkit
4.02 Phishing Tests
4.03 Reconnaissance Through Open-Source Intelligence
Lab Analysis
Key Term Quiz
Humans are, have been, and will always be the weakest link in any security implementation. Any hardware or software implementation of security can easily be undone extremely quickly by a gullible or naive human.
Social engineering is an art and science that is used by cybercriminals to convince people to grant the attackers’ requests—often things they normally wouldn’t and shouldn’t do. Social engineering cybercriminals use psychological tricks to get people to reveal information the criminals need regarding systems, networks, and infrastructures. It’s ...
Get Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.