Hacking the Human: Social Engineering Techniques and Security CountermeasuresGower Publishing, Ltd., 2012 M09 28 - 266 páginas Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read. |
Contenido
Introduction | 1 |
THE RISKS | 9 |
UNDERSTANDING HUMAN VULNERABILITIES | 85 |
COUNTERMEASURES | 153 |
Further Reading | 235 |
| 247 | |
Otras ediciones - Ver todas
Hacking the Human: Social Engineering Techniques and Security Countermeasures Ian Mann Vista previa limitada - 2008 |
Hacking the Human: Social Engineering Techniques and Security Countermeasures Ian Mann Vista previa limitada - 2017 |
Hacking the Human: Social Engineering Techniques and Security Countermeasures Ian Mann Vista previa limitada - 2008 |
Términos y frases comunes
access control activities addition analysis approach areas audit authentication badge bank BankY behaviour biometric bypass call centre challenge CHAPTER classification client cold reading confidential conscious brain credit card CriticalX Derren Brown detect develop document easy effective elements employees example executives exploit explore gain give HackerZ hacking helpdesk human vulnerabilities hypnosis identify incident individuals information security risk interesting Internet ISBN John Grinder Johnny JohnnyT login look mapping mind Neuro-Linguistic Programming online banking organization passwords Payment Card Industry personality profiling phishing potential question rapport reading receptionist remember Richard Bandler risk assessment role Sarah Sarah Clark security countermeasures security guards security management senior managers simple social engineering attack social engineering techniques social engineering testing someone staff strategy subconscious systemic protection target technical threat Transactional Analysis trick trying two-factor authentication understand users usually weaknesses whilst
