Social engineering in IT security tools, tactics, and techniques

This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technol...

Full description

Bibliographic Details
Main Author: Conheady, Sharon
Format: eBook
Language:English
Published: New York McGraw-Hill Education 2014
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Description
Summary:This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering. You will explore the evolution of social engineering, from the classic con artist to the modern social engineer; understand the legal and ethical aspects of performing a social engineering test; learn why social engineering works from a victim's point of view; plan a social engineering test; execute both on-site and remote social engineering tests; write an effective social engineering report; learn about various tools, including software, hardware, and on-site tools; and learn how to defend your organization against social engineering attacks. --
Physical Description:1 volume illustrations
ISBN:9780071818476