43,30 €*
Versandkostenfrei per Post / DHL
Lieferzeit 4-7 Werktage
The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
Introduction to Social Engineering
Why People are the Weakest Link in your Security
Basic Techniques, Deception, and Manipulation
Assessment Prerequisites
Reconnaissance: Building the Foundation of an Assessment
Ensuring Value Through Effective Threat Modeling
Designed Targeted Scenarios
A Model for Creating Plausible Situations
The Email Attack Vector - Spear Phishing
The Telephone Attack Vector
The Physical Attack Vector
Supporting an Attack with Technology
Difference between "Long Game" and "Short Game" Attack Strategies
Writing the Report
Creating Hardened Policies and Procedures
Reclassifying Information
Improving Physical Security Controls
Designing and Conducting Effective Staff Awareness Training
Internal Social Engineering Assessments
Erscheinungsjahr: | 2014 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Kartoniert / Broschiert |
ISBN-13: | 9780124201248 |
ISBN-10: | 0124201245 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Mason, Andrew
Watson, Gavin Ackroyd, Richard |
Hersteller: | Syngress Media,U.S. |
Verantwortliche Person für die EU: | Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
Maße: | 233 x 192 x 22 mm |
Von/Mit: | Andrew Mason (u. a.) |
Erscheinungsdatum: | 07.06.2014 |
Gewicht: | 0,835 kg |
Introduction to Social Engineering
Why People are the Weakest Link in your Security
Basic Techniques, Deception, and Manipulation
Assessment Prerequisites
Reconnaissance: Building the Foundation of an Assessment
Ensuring Value Through Effective Threat Modeling
Designed Targeted Scenarios
A Model for Creating Plausible Situations
The Email Attack Vector - Spear Phishing
The Telephone Attack Vector
The Physical Attack Vector
Supporting an Attack with Technology
Difference between "Long Game" and "Short Game" Attack Strategies
Writing the Report
Creating Hardened Policies and Procedures
Reclassifying Information
Improving Physical Security Controls
Designing and Conducting Effective Staff Awareness Training
Internal Social Engineering Assessments
Erscheinungsjahr: | 2014 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Kartoniert / Broschiert |
ISBN-13: | 9780124201248 |
ISBN-10: | 0124201245 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Mason, Andrew
Watson, Gavin Ackroyd, Richard |
Hersteller: | Syngress Media,U.S. |
Verantwortliche Person für die EU: | Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
Maße: | 233 x 192 x 22 mm |
Von/Mit: | Andrew Mason (u. a.) |
Erscheinungsdatum: | 07.06.2014 |
Gewicht: | 0,835 kg |