Book description
Cutting-edge social engineering testing techniques
"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.- Explore the evolution of social engineering, from the classic con artist to the modern social engineer
- Understand the legal and ethical aspects of performing a social engineering test
- Find out why social engineering works from a victim's point of view
- Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
- Gather information through research and reconnaissance
- Create a credible social engineering scenario
- Execute both on-site and remote social engineering tests
- Write an effective social engineering report
- Learn about various tools, including software, hardware, and on-site tools
- Defend your organization against social engineering attacks
Table of contents
- Cover
- Title Page
- Copyright Page
- About the Author
- Contents at a Glance
- Contents
- Foreword
- Acknowledgments
- Introduction
- Chapter 1: Introduction to Social Engineering
- Chapter 2: The Legal and Ethical Aspects of Social Engineering Tests
- Chapter 3: Why Social Engineering Works
- Chapter 4: Planning Your Social Engineering Test
- Chapter 5: Research and Reconnaissance
- Chapter 6: Creating the Scenario
- Chapter 7: Executing the Social Engineering Test
- Chapter 8: Writing the Social Engineering Report
- Chapter 9: Tools of the Trade
- Chapter 10: Defense Against the Dark Arts
- Chapter 11: Social Engineering: Past, Present, and Future
- Index
Product information
- Title: Social Engineering in IT Security: Tools, Tactics, and Techniques
- Author(s):
- Release date: August 2014
- Publisher(s): McGraw-Hill
- ISBN: 9780071818476
You might also like
book
Building an Information Security Awareness Program
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to …
book
Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established …
book
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives …
book
Security Risk Assessment
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a …