Return to home page
Searching: Bluffton library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.

LEADER 00000cam  2200781Ia 4500 
001    880637978 
003    OCoLC 
005    20201009145839.7 
006    m     o  d         
007    cr unu|||||||| 
008    140528s2014    maua    ob    001 0 eng d 
010    2014003510 
019    878114942|a898035836|a1065906009|a1153027111 
020    9780124201828 
020    0124201822 
020    1306642329|q(ebk) 
020    9781306642323|q(ebk) 
020    0124201245 
020    9780124201248 
020    |z9780124201248 
035    (OCoLC)880637978|z(OCoLC)878114942|z(OCoLC)898035836
037    CL0500000435|bSafari Books Online 
040    UMI|beng|epn|cUMI|dUIU|dIDEBK|dE7B|dCDX|dYDXCP|dOCLCF
049    MAIN 
050  4 HM668|b.W387 2014 
060  4 Online Book 
082 04 303.4|b23 
100 1  Watson, Gavin,|d1982-|eauthor. 
245 10 Social engineering penetration testing :|bexecuting social
       engineering pen tests, assessments and defense /|cGavin 
       Watson, Andrew Mason, Richard Ackroyd ; foreword Chris 
260    Waltham, Massachusetts :|bSyngress,|c2014. 
300    1 online resource :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  Front Cover; Social Engineering Penetration Testing; 
       Copyright Page; Contents; Foreword; Acknowledgements; 
       About the Authors; About the Technical Editor; 1 An 
       Introduction to Social Engineering; Introduction; Defining
       social engineering; Examples from the movies; Sneakers; 
       Hackers; Matchstick Men; Dirty Rotten Scoundrels; The 
       Imposter; Famous social engineers; Kevin Mitnik; Frank 
       Abagnale; Badir brothers; Chris Hadnagy; Chris Nickerson; 
       Real-world attacks; The RSA breach; The Buckingham Palace 
       breach; The Financial Times breach; The Microsoft XBox 
       breach; Operation Camion; Summary. 
505 8  2 The Weak Link in the Business Security 
       ChainIntroduction; Why personnel are the weakest link; 
       Secure data with vulnerable users; The problem with 
       privileges; Data classifications and need to know; 
       Security, availability, and functionality; Customer 
       service mentality; Poor management example; Lack of 
       awareness and training; Weak security policies; Weak 
       procedures; Summary; 3 The Techniques of Manipulation; 
       Introduction; Pretexting; Impersonation; Baiting; Pressure
       and solution; Leveraging authority; Reverse social 
       engineering; Chain of authentication; Gaining credibility.
505 8  From innocuous to sensitivePriming and loading; Social 
       proof; Framing information; Emotional states; Selective 
       attention; Personality types and models; Body language; 
       Summary; 4 Short and Long Game Attack Strategies; 
       Introduction; Short-term attack strategies; Targeting the 
       right areas; Using the allotted time effectively; Common 
       short game scenarios; Long-term attack strategies; 
       Expanding on initial reconnaissance; Fake social media 
       profiles; Information elicitation; Extended phishing 
       attacks; Gaining inside help; Working at the target 
       company; Targeting partner companies. 
505 8  Long-term surveillanceSummary; 5 The Social Engineering 
       Engagement; Introduction; The business need for social 
       engineering; Compliance and security standards; Payment 
       Cards Industry Data Security Standard; ISO/IEC 27000 
       information security series; Human Resource Security, 
       Domain 8; Physical and Environmental Security, Domain 9; 
       Social engineering operational considerations and 
       challenges; Challenges for the social engineers; Less 
       mission impossible, more mission improbable; Dealing with 
       unrealistic time scales; Dealing with unrealistic time 
       frames; Taking one for the team; Name and shame. 
505 8  Project managementChallenges for the client; Getting the 
       right people; Legislative considerations; The Computer 
       Misuse Act 1990 (UK)-
       1990/18; Section 1-Unauthorized access to computer 
       material; Section 2-Unauthorized access with intent to 
       commit or facilitate commission of further offenses; 
       Section 3-Unauthorized acts with intent to impair or with 
       recklessness as to impairing, operation of computer, etc.;
       The Police and Justice Act 2006 (UK)-http:// 
520    This book gives the practical methodology needed to plan 
       and execute a social engineering penetration test and 
       assessment. It has insights into how social engineering 
       techniques--including email phishing, telephone pretexting,
       and physical vectors--can be used to elicit information or
       manipulate individuals into performing actions that may 
       aid in an attack. Using the book's easy-to-understand 
       models and examples, the reader will have a much better 
       understanding of how best to defend against these attacks.
       The authors show hands-on techniques they have used at 
       RandomStorm to provide clients with valuable results that 
       make a real difference to the security of their 
       businesses. The book shows how to use widely available 
       open-source tools to conduct pen tests and the practical 
       steps to improve defense measures in response to test 
       results. --|cEdited summary from book. 
588 0  Print version record. 
650  0 Social engineering. 
650  7 Social engineering.|2fast|0(OCoLC)fst01122444 
650 12 Social Sciences. 
700 1  Mason, Andrew G.,|eauthor. 
700 1  Ackroyd, Richard,|eauthor. 
776 08 |iPrint version:|aWatson, Gavin, 1982-|tSocial engineering
       penetration testing|z9780124201248|w(DLC)  2014003510
990    ProQuest Safari|bO'Reilly Online Learning: Academic/Public
       Library Edition|c2020-10-09|yKB collection name change
990    ProQuest Safari|bO'Reilly Safari Learning Platform: 
       Academic edition|c2018-11-02|yMaster record variable 
       field(s) change: 505|5OH1 
990    ProQuest Safari|bO'Reilly Safari Learning Platform: 
       Academic edition|c2018-10-22|yNew collection 
View online

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team