The art of social engineering uncover the secrets behind the human dynamics in cybersecurity

The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You'll learn the most intriguin...

Full description

Bibliographic Details
Main Authors: Bravo, Cesar, Toska, Desilda (Author)
Format: eBook
Language:English
Published: Birmingham Packt Publishing 2023
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Malicious apps and app-based attacks
  • Exploiting app permissions for data access
  • The challenges in identifying and mitigating such attacks
  • Social engineering via social networks
  • Clickbait attack
  • WhatsApp-based attacks
  • Instagram-based attacks
  • Other attacks
  • Sextortion
  • Fake news attacks
  • Forex scams
  • Summary
  • Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks
  • Technical requirements
  • Artificial intelligence in social engineering attacks
  • The growing role of AI in social engineering
  • AI-driven social engineering techniques
  • The Business Email Compromise scam
  • Fraud compensation
  • Scambaiting
  • Summary
  • Chapter 4: Types of Social Engineering Attacks
  • Technical requirements
  • Disclaimer
  • Phishing attacks
  • History of phishing attacks
  • Famous phishing attacks
  • Types of phishing attacks
  • Baiting
  • Physical baiting
  • Cyber baiting
  • Protecting yourself against baiting
  • Dumpster diving
  • Tailgating
  • Quid pro quo
  • Free tech support
  • Free software to download
  • How to protect yourself against quid pro quo attacks
  • Pretexting
  • Fake job offers
  • False charities
  • Watering hole
  • Chapter 2: Understanding Social Engineering
  • Technical requirements
  • Detecting social engineering attacks
  • Social media attacks
  • The lost passport
  • The federal government grant
  • Romance scam
  • Fake investment
  • Fake advertisements
  • Social engineering and the crypto scam
  • Summary
  • Chapter 3: Common Scam Attacks
  • Technical requirements
  • What is a scam?
  • The Nigerian scam (419)
  • The history of the scam
  • Identifying the Nigerian scam
  • Types of Nigerian scams
  • Funny Nigerian scams
  • Avoiding these scams
  • Other scams
  • The investor scam
  • Cover
  • Title Page
  • Copyright and Credits
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Understanding Social Engineering
  • Chapter 1: The Psychology behind Social Engineering
  • Technical requirements
  • Disclaimer
  • Understanding the art of manipulation
  • Examining the six principles of persuasion
  • Developing rapport
  • Using appropriate body language
  • Using your knowledge to help
  • Complimenting
  • Supporting other points of view
  • Leveraging empathy
  • Leveraging influence for defensive security
  • Summary
  • Further reading
  • Crypto mining
  • Summary
  • Further reading
  • Part 2: Enhanced Social Engineering Attacks
  • Chapter 5: Enhanced Social Engineering Attacks
  • Technical requirements
  • Disclaimer
  • Targeted attacks
  • Identifying high-value targets
  • OSINT
  • OSINT tools
  • OSINT methods
  • OSINT use cases
  • Web-based attacks
  • Fake logins
  • Fake updates
  • Scareware
  • Fake pages
  • Magic-ware
  • Hacking-ware
  • Gaming-based attacks
  • Forum-based attacks
  • Adware
  • Summary
  • Chapter 6: Social Engineering and Social Network Attacks
  • Disclaimer
  • Social engineering through mobile applications