Muutke küpsiste eelistusi

E-raamat: Social Engineering: The Science of Human Hacking

3.83/5 (3791 hinnangut Goodreads-ist)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 25-Jun-2018
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119433736
  • Formaat - PDF+DRM
  • Hind: 28,28 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: PDF+DRM
  • Ilmumisaeg: 25-Jun-2018
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119433736

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Harden the human firewall against the most current threats

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.

Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks.

  • Examine the most common social engineering tricks used to gain access
  • Discover which popular techniques generally don’t work in the real world
  • Examine how our understanding of the science behind emotions and decisions can be used by social engineers
  • Learn how social engineering factors into some of the biggest recent headlines
  • Learn how to use these skills as a professional social engineer and secure your company
  • Adopt effective counter-measures to keep hackers at bay

By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Acknowledgments xi
Foreword xix
Preface xxi
1 A Look into the New World of Professional Social Engineering
1(16)
What Has Changed?
2(2)
Why Should You Read This Book?
4(2)
An Overview of Social Engineering
6(5)
The SE Pyramid
11(3)
What's in This Book?
14(1)
Summary
15(2)
2 Do You See What I See?
17(46)
A Real-World Example of Collecting OSINT
17(5)
Nontechnical OSINT
22(37)
Tools of the Trade
59(2)
Summary
61(2)
3 Profiling People Through Communication
63(20)
The Approach
66(2)
Enter the DISC
68(12)
Summary
80(3)
4 Becoming Anyone You Want to Be
83(18)
The Principles of Pretexting
84(14)
Summary
98(3)
5 I Know How to Make You Like Me
101(22)
The Tribe Mentality
103(2)
Building Rapport as a Social Engineer
105(15)
The Rapport Machine
120(1)
Summary
121(2)
6 Under the Influence
123(34)
Principle One Reciprocity
125(3)
Principle Two Obligation
128(3)
Principle Three Concession
131(3)
Principle Four Scarcity
134(3)
Principle Five Authority
137(5)
Principle Six Consistency and Commitment
142(4)
Principle Seven Liking
146(2)
Principle Eight Social Proof
148(3)
Influence vs. Manipulation
151(5)
Summary
156(1)
7 Building Your Artwork
157(26)
The Dynamic Rules of Framing
159(9)
Elicitation
168(14)
Summary
182(1)
8 I Can See What You Didn't Say
183(40)
Nonverbals Are Essential
184(3)
All Your Baselines Belong to Us
187(9)
Understand the Basics of Nonverbals
196(2)
Comfort vs. Discomfort
198(22)
Summary
220(3)
9 Hacking the Humans
223(34)
An Equal Opportunity Victimizer
224(1)
The Principles of the Pentest
225(4)
Phishing
229(4)
Vishing
233(7)
SMiShing
240(1)
Impersonation
241(5)
Reporting
246(4)
Top Questions for the SE Pentester
250(4)
Summary
254(3)
10 Do You Have a M.A.P.P.?
257(20)
Step 1 Learn to Identify Social Engineering Attacks
259(2)
Step 2 Develop Actionable and Realistic Policies
261(3)
Step 3 Perform Regular Real-World Checkups
264(2)
Step 4 Implement Applicable Security-Awareness Programs
266(1)
Tie It All Together
267(1)
Gotta Keep 'Em Updated
268(2)
Let the Mistakes of Your Peers Be Your Teacher
270(1)
Create a Security Awareness Culture
271(3)
Summary
274(3)
11 Now What?
277(10)
Soft Skills for Becoming an Social Engineer
277(3)
Technical Skills
280(1)
Education
281(2)
Job Prospects
283(1)
The Future of Social Engineering
284(3)
Index 287
CHRISTOPHER HADNAGY is the CEO and Chief Human Hacker of Social-Engineer, LLC as well as the lead developer and creator of the world's first social engineering framework found at social-engineer.org. He is the founder and creator of the Social Engineering Village (SEVillage) at DEF CON and DerbyCon,as well as the creator of the popular Social Engineering Capture the Flag (SECTF). He is a sought-after speaker and trainer and even has debriefed the Pentagon on these topics. He can be found tweeting at @humanhacker.