Social engineering penetration testing executing social engineering pen tests, assessments and defense

This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate ind...

Full description

Bibliographic Details
Main Authors: Watson, Gavin, Mason, Andrew G. (Author), Ackroyd, Richard (Author)
Format: eBook
Language:English
Published: Waltham, Massachusetts Syngress 2014
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Description
Summary:This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, the reader will have a much better understanding of how best to defend against these attacks. The authors show hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. The book shows how to use widely available open-source tools to conduct pen tests and the practical steps to improve defense measures in response to test results. --
Physical Description:1 online resource illustrations
ISBN:9781306642323
0124201822
1306642329
0124201245
9780124201828