Muutke küpsiste eelistusi

Social Engineering and Nonverbal Behavior Set [Pehme köide]

  • Formaat: Paperback / softback, 752 pages, kõrgus x laius x paksus: 226x150x28 mm, kaal: 476 g
  • Ilmumisaeg: 01-Jul-2014
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118906713
  • ISBN-13: 9781118906712
Teised raamatud teemal:
  • Pehme köide
  • Hind: 67,38 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 752 pages, kõrgus x laius x paksus: 226x150x28 mm, kaal: 476 g
  • Ilmumisaeg: 01-Jul-2014
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118906713
  • ISBN-13: 9781118906712
Teised raamatud teemal:
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.

Social Engineering: The Art of Human Hacking

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

Unmasking the Social Engineer: The Human Element of Security

Focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming.

  • Clearly combines both the practical and technical aspects of social engineering security
  • Reveals the various dirty tricks that scammers use
  • Pinpoints what to look for on the nonverbal side to detect the social engineer
Foreword xv
Acknowledgments and Preface xvii
Introduction xxi
I Building the Foundation
1(50)
1 What Is Nonverbal Communication?
3(22)
The Different Aspects of Nonverbal Communication
8(1)
Kinesics
9(4)
Proxemics
13(1)
Touch
14(1)
Eye Contact
15(1)
Olfactics
16(1)
Adornment
17(2)
Facial Expressions
19(1)
How to Use This Information
20(3)
Summary
23(2)
2 What Is Social Engineering?
25(26)
Information Gathering
28(1)
Pretexting
29(1)
Elicitation
30(1)
Rapport
30(2)
Influence/Manipulation
32(1)
Framing
33(1)
Nonverbal Communications
34(1)
The Three Basic Forms of Social Engineering
34(1)
Become Phishers of Men
35(4)
When The Phone Is More Dangerous Than Malware
39(4)
I Am Not the Social Engineer You Are Looking For
43(2)
Using Social Engineering Skills
45(1)
The Good
46(1)
The Bad
47(1)
The Ugly
48(1)
Summary
48(3)
II Decoding the Language of the Body
51(108)
3 Understanding the Language of the Hands
53(28)
Communicating with Your Hands
55(2)
Origin
57(1)
Coding
57(1)
Usage
58(8)
High-Confidence Hand Displays
66(9)
Low-Confidence and Stress Hand Displays
75(3)
Getting a Handle on the Hands
78(1)
Summary
79(2)
4 The Torso, Legs, and Feet
81(18)
Legs and Feet
83(6)
Torso and Arms
89(8)
Summary
97(2)
5 The Science Behind the Face
99(40)
Just the FACS
103(2)
What Is a Truth Wizard?
105(3)
Emotions versus Feelings
108(1)
Fear
109(4)
Surprise
113(3)
Sadness
116(5)
Contempt
121(4)
Disgust
125(3)
Anger
128(4)
Happiness
132(4)
Perfect Practice Makes Perfect
136(1)
Summary
137(2)
6 Understanding Nonverbal Displays of Comfort and Discomfort
139(20)
Neck and Face Pacifying
143(1)
What to Watch For
144(2)
Mouth Covers
146(1)
What to Watch For
147(1)
Lips
147(4)
What to Watch For
151(2)
Eye Blocking
153(1)
What to Watch For
154(1)
Self-Comforting and Head Tilts
154(3)
What to Watch For
157(1)
Summary
158(1)
III Deciphering the Science
159(38)
7 The Human Emotional Processor
161(16)
Introducing the Amygdala
164(1)
How the Amygdala Processes Information
165(2)
Hijacking the Amygdala
167(2)
Human See, Human Do
169(1)
Reading Other People's Expressions
170(1)
Your Own Emotional Content
171(1)
Nonverbal Social Proof
171(1)
Using Amygdala Hijacking as a Social Engineer
172(2)
Summary
174(3)
8 The Nonverbal Side of Elicitation
177(20)
Artificial Time Constraints
181(1)
Sympathy/Assistance Themes
182(2)
Ego Suspension
184(2)
Ask How, When, and Why Questions
186(1)
Conversational Signals
187(1)
Action Unit 1: Inner Brow Raiser
188(1)
Action Unit 2: Outer Brow Raiser
188(1)
Action Unit 4: Brow Lowerer
189(1)
Conversational Signals of Emotions
190(1)
Breaking Down Conversational Signals
191(1)
Batons
191(1)
Underliner
192(1)
Punctuation
192(1)
Question Mark
193(1)
Word Search
193(1)
Nonverbal Conversational Signals
193(2)
Conversational Signals as a Social Engineer
195(1)
Summary
196(1)
IV Putting It All Together
197(166)
9 Nonverbal Communication and the Human Being
199
Applying This Information as a Professional Social Engineer
202(4)
Using This Book to Defend
206(1)
Becoming a Critical Thinker
207(3)
Summary
210(3)
Index 213
Foreword xiii
Preface and Acknowledgments xvii
1 A Look into the World of Social Engineering
1(22)
Why This Book Is So Valuable
3(6)
Overview of Social Engineering
9(12)
Summary
21(2)
2 Information Gathering
23(32)
Gathering Information
26(7)
Sources for Information Gathering
33(10)
Communication Modeling
43(10)
The Power of Communication Models
53(2)
3 Elicitation
55(22)
What Is Elicitation?
56(2)
The Goals of Elicitation
58(16)
Mastering Elicitation
74(2)
Summary
76(1)
4 Pretexting: How to Become Anyone
77(24)
What Is Pretexting?
78(1)
The Principles and Planning Stages of Pretexting
79(12)
Successful Pretexting
91(8)
Summary
99(2)
5 Mind Tricks: Psychological Principles Used in Social Engineering
101(80)
Modes of Thinking
103(6)
Microexpressions
109(27)
Neurolinguistic Programming (NLP)
136(7)
Interview and Interrogation
143(19)
Building Instant Rapport
162(10)
The Human Buffer Overflow
172(6)
Summary
178(3)
6 Influence: The Power of Persuasion
181(78)
The Five Fundamentals of Influence and Persuasion
182(5)
Influence Tactics
187(28)
Altering Reality: Framing
215(18)
Manipulation: Controlling Your Target
233(15)
Manipulation in Social Engineering
248(8)
Summary
256(3)
7 The Tools of the Social Engineer
259(40)
Physical Tools
260(19)
Online Information-Gathering Tools
279(18)
Summary
297(2)
8 Case Studies: Dissecting the Social Engineer
299(40)
Mitnick Case Study 1: Hacking the DMV
300(6)
Mitnick Case Study 2: Hacking the Social Security Administration
306(4)
Hadnagy Case Study 1: The Overconfident CEO
310(7)
Hadnagy Case Study 2: The Theme Park Scandal
317(5)
Top-Secret Case Study 1: Mission Not Impossible
322(7)
Top-Secret Case Study 2: Social Engineering a Hacker
329(8)
Why Case Studies Are Important
337(1)
Summary
338(1)
9 Prevention and Mitigation
339(24)
Learning to Identify Social Engineering Attacks
340(1)
Creating a Personal Security Awareness Culture
341(3)
Being Aware of the Value of the Information You Are Being Asked For
344(3)
Keeping Software Updated
347(1)
Developing Scripts
348(1)
Learning from Social Engineering Audits
348(6)
Concluding Remarks
354(7)
Summary
361(2)
Index 363
Chris Hadnagy is a worldwide consultant on the "human" aspect of security technology: social engineering. He provides training to the Fortune 500 (Sony, LockHeed Martin, etc.) analyzing malicious attacks by social engineers/hackers and then provides step-by-step prevention techniques. Chris is a frequent speaker at RSA and major security conferences and is the author of Wiley's best-selling book, Social Engineering: The Art of Human Hacking. Chris can be found online at www.social-engineer.org, www.social-engineer.com and twitter @humanhacker.

Paul Ekman is a pioneer in the study of nonverbal behavior. He was among TIME Magazine's Top 100 most influential people in 2009. His work has been covered in Time, Smithsonian Magazine, Psychology Today, The New Yorker, New York Times, and the Washington Post. He has appeared on 48 Hours, Dateline, Good Morning America, 20/20, Larry King, Oprah, News Hour with Jim Lehrer, and the TV show Lie to Me was based on Dr. Ekman's work.