O'Reilly logo

Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1 
Introduction to Social Engineering
They say a little knowledge is a dangerous thing, but it’s not one half so bad as a lot of ignorance.
—Terry Pratchett
Welcome to the twisted and deceitful world of social engineering where nothing is as it seems. What you are about to read can be used for good or for evil. The choice is yours to make. Social engineering involves convincing people to perform actions they would not normally do. This usually involves revealing certain information or bypassing certain security controls, giving the social engineer access to sensitive information or facilities. It can be as simple as slipping in through a door that someone has left open or as sophisticated as setting up a long-term scam where the social engineer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required