Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please
contact your library for new procedures, specific requests, or other assistance.
LEADER 00000cam 2200781Ia 4500
001 880637978
003 OCoLC
005 20201009145839.7
006 m o d
007 cr unu||||||||
008 140528s2014 maua ob 001 0 eng d
010 2014003510
019 878114942|a898035836|a1065906009|a1153027111
020 9780124201828
020 0124201822
020 1306642329|q(ebk)
020 9781306642323|q(ebk)
020 0124201245
020 9780124201248
020 |z9780124201248
035 (OCoLC)880637978|z(OCoLC)878114942|z(OCoLC)898035836
|z(OCoLC)1065906009|z(OCoLC)1153027111
037 CL0500000435|bSafari Books Online
040 UMI|beng|epn|cUMI|dUIU|dIDEBK|dE7B|dCDX|dYDXCP|dOCLCF
|dDEBBG|dDEBSZ|dTPH|dSTF|dB24X7|dCOO|dRIV|dCDS|dVT2|dOCLCQ
|dOCLCO|dTFW|dOCLCQ|dLIV|dOCLCQ|dOCLCO|dOCLCA|dCEF|dINT
|dAU@|dOCLCO|dOCLCQ|dWYU|dOCLCA
049 MAIN
050 4 HM668|b.W387 2014
060 4 Online Book
082 04 303.4|b23
100 1 Watson, Gavin,|d1982-|eauthor.
245 10 Social engineering penetration testing :|bexecuting social
engineering pen tests, assessments and defense /|cGavin
Watson, Andrew Mason, Richard Ackroyd ; foreword Chris
Hadnagy.
260 Waltham, Massachusetts :|bSyngress,|c2014.
300 1 online resource :|billustrations
336 text|btxt|2rdacontent
337 computer|bc|2rdamedia
338 online resource|bcr|2rdacarrier
504 Includes bibliographical references and index.
505 0 Front Cover; Social Engineering Penetration Testing;
Copyright Page; Contents; Foreword; Acknowledgements;
About the Authors; About the Technical Editor; 1 An
Introduction to Social Engineering; Introduction; Defining
social engineering; Examples from the movies; Sneakers;
Hackers; Matchstick Men; Dirty Rotten Scoundrels; The
Imposter; Famous social engineers; Kevin Mitnik; Frank
Abagnale; Badir brothers; Chris Hadnagy; Chris Nickerson;
Real-world attacks; The RSA breach; The Buckingham Palace
breach; The Financial Times breach; The Microsoft XBox
breach; Operation Camion; Summary.
505 8 2 The Weak Link in the Business Security
ChainIntroduction; Why personnel are the weakest link;
Secure data with vulnerable users; The problem with
privileges; Data classifications and need to know;
Security, availability, and functionality; Customer
service mentality; Poor management example; Lack of
awareness and training; Weak security policies; Weak
procedures; Summary; 3 The Techniques of Manipulation;
Introduction; Pretexting; Impersonation; Baiting; Pressure
and solution; Leveraging authority; Reverse social
engineering; Chain of authentication; Gaining credibility.
505 8 From innocuous to sensitivePriming and loading; Social
proof; Framing information; Emotional states; Selective
attention; Personality types and models; Body language;
Summary; 4 Short and Long Game Attack Strategies;
Introduction; Short-term attack strategies; Targeting the
right areas; Using the allotted time effectively; Common
short game scenarios; Long-term attack strategies;
Expanding on initial reconnaissance; Fake social media
profiles; Information elicitation; Extended phishing
attacks; Gaining inside help; Working at the target
company; Targeting partner companies.
505 8 Long-term surveillanceSummary; 5 The Social Engineering
Engagement; Introduction; The business need for social
engineering; Compliance and security standards; Payment
Cards Industry Data Security Standard; ISO/IEC 27000
information security series; Human Resource Security,
Domain 8; Physical and Environmental Security, Domain 9;
Social engineering operational considerations and
challenges; Challenges for the social engineers; Less
mission impossible, more mission improbable; Dealing with
unrealistic time scales; Dealing with unrealistic time
frames; Taking one for the team; Name and shame.
505 8 Project managementChallenges for the client; Getting the
right people; Legislative considerations; The Computer
Misuse Act 1990 (UK)-http://www.legislation.gov.uk/ukpga/
1990/18; Section 1-Unauthorized access to computer
material; Section 2-Unauthorized access with intent to
commit or facilitate commission of further offenses;
Section 3-Unauthorized acts with intent to impair or with
recklessness as to impairing, operation of computer, etc.;
The Police and Justice Act 2006 (UK)-http://
www.legislation.gov.uk/ukpga/2006/48/contents.
520 This book gives the practical methodology needed to plan
and execute a social engineering penetration test and
assessment. It has insights into how social engineering
techniques--including email phishing, telephone pretexting,
and physical vectors--can be used to elicit information or
manipulate individuals into performing actions that may
aid in an attack. Using the book's easy-to-understand
models and examples, the reader will have a much better
understanding of how best to defend against these attacks.
The authors show hands-on techniques they have used at
RandomStorm to provide clients with valuable results that
make a real difference to the security of their
businesses. The book shows how to use widely available
open-source tools to conduct pen tests and the practical
steps to improve defense measures in response to test
results. --|cEdited summary from book.
588 0 Print version record.
650 0 Social engineering.
650 7 Social engineering.|2fast|0(OCoLC)fst01122444
650 12 Social Sciences.
700 1 Mason, Andrew G.,|eauthor.
700 1 Ackroyd, Richard,|eauthor.
776 08 |iPrint version:|aWatson, Gavin, 1982-|tSocial engineering
penetration testing|z9780124201248|w(DLC) 2014003510
|w(OCoLC)871186904
990 ProQuest Safari|bO'Reilly Online Learning: Academic/Public
Library Edition|c2020-10-09|yKB collection name change
|5OH1
990 ProQuest Safari|bO'Reilly Safari Learning Platform:
Academic edition|c2018-11-02|yMaster record variable
field(s) change: 505|5OH1
990 ProQuest Safari|bO'Reilly Safari Learning Platform:
Academic edition|c2018-10-22|yNew collection
ProQuest.ormac|5OH1