The art of social engineering uncover the secrets behind the human dynamics in cybersecurity

The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You'll learn the most intriguin...

Full description

Bibliographic Details
Main Authors: Bravo, Cesar, Toska, Desilda (Author)
Format: eBook
Language:English
Published: Birmingham Packt Publishing 2023
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 06890nmm a2200445 u 4500
001 EB002185783
003 EBX01000000000000001323270
005 00000000000000.0
007 cr|||||||||||||||||||||
008 231103 ||| eng
020 |a 9781804614532 
050 4 |a QA76.9.A25 
100 1 |a Bravo, Cesar 
245 0 0 |a The art of social engineering  |b uncover the secrets behind the human dynamics in cybersecurity  |c Cesar Bravo, Desilda Toska 
250 |a 1st edition 
260 |a Birmingham  |b Packt Publishing  |c 2023 
300 |a 1 volume 
505 0 |a Malicious apps and app-based attacks -- Exploiting app permissions for data access -- The challenges in identifying and mitigating such attacks -- Social engineering via social networks -- Clickbait attack -- WhatsApp-based attacks -- Instagram-based attacks -- Other attacks -- Sextortion -- Fake news attacks -- Forex scams -- Summary -- Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks -- Technical requirements -- Artificial intelligence in social engineering attacks -- The growing role of AI in social engineering -- AI-driven social engineering techniques 
505 0 |a The Business Email Compromise scam -- Fraud compensation -- Scambaiting -- Summary -- Chapter 4: Types of Social Engineering Attacks -- Technical requirements -- Disclaimer -- Phishing attacks -- History of phishing attacks -- Famous phishing attacks -- Types of phishing attacks -- Baiting -- Physical baiting -- Cyber baiting -- Protecting yourself against baiting -- Dumpster diving -- Tailgating -- Quid pro quo -- Free tech support -- Free software to download -- How to protect yourself against quid pro quo attacks -- Pretexting -- Fake job offers -- False charities -- Watering hole 
505 0 |a Chapter 2: Understanding Social Engineering -- Technical requirements -- Detecting social engineering attacks -- Social media attacks -- The lost passport -- The federal government grant -- Romance scam -- Fake investment -- Fake advertisements -- Social engineering and the crypto scam -- Summary -- Chapter 3: Common Scam Attacks -- Technical requirements -- What is a scam? -- The Nigerian scam (419) -- The history of the scam -- Identifying the Nigerian scam -- Types of Nigerian scams -- Funny Nigerian scams -- Avoiding these scams -- Other scams -- The investor scam 
505 0 |a Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding Social Engineering -- Chapter 1: The Psychology behind Social Engineering -- Technical requirements -- Disclaimer -- Understanding the art of manipulation -- Examining the six principles of persuasion -- Developing rapport -- Using appropriate body language -- Using your knowledge to help -- Complimenting -- Supporting other points of view -- Leveraging empathy -- Leveraging influence for defensive security -- Summary -- Further reading 
505 0 |a Crypto mining -- Summary -- Further reading -- Part 2: Enhanced Social Engineering Attacks -- Chapter 5: Enhanced Social Engineering Attacks -- Technical requirements -- Disclaimer -- Targeted attacks -- Identifying high-value targets -- OSINT -- OSINT tools -- OSINT methods -- OSINT use cases -- Web-based attacks -- Fake logins -- Fake updates -- Scareware -- Fake pages -- Magic-ware -- Hacking-ware -- Gaming-based attacks -- Forum-based attacks -- Adware -- Summary -- Chapter 6: Social Engineering and Social Network Attacks -- Disclaimer -- Social engineering through mobile applications 
653 |a Sécurité informatique / Aspect social 
653 |a Computer security / Social aspects 
653 |a Business enterprises / Security measures / fast 
653 |a Entreprises / Sécurité / Mesures 
653 |a Business enterprises / Security measures 
653 |a Computer security / Social aspects / fast 
700 1 |a Toska, Desilda  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9781804613641 
776 |z 1804613649 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781804613641/?ar  |x Verlag  |3 Volltext 
082 0 |a 338 
082 0 |a 330 
082 0 |a 005.8 
520 |a The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.  
520 |a What you will learn Grasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat 
520 |a Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guide Key Features Gain insights into the open source intelligence (OSINT) methods used by attackers to harvest data Understand the evolving implications of social engineering on social networks Implement effective defensive strategies to mitigate the probability and impact of social engineering attacks Purchase of the print or Kindle book includes a free PDF eBook Book Description Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.