๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Hacking the human: social engineering techniques and security countermeasures

โœ Scribed by Ian Mann


Publisher
Gower
Year
2008
Tongue
English
Leaves
267
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.
Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available.
There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.


๐Ÿ“œ SIMILAR VOLUMES


Practical hacking techniques and counter
โœ Mark D. Spivey ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Auerbach Publications ๐ŸŒ English

Examining computer security from the hacker's perspective, <em>Practical Hacking Techniques and Countermeasures</em> employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to foll

Practical hacking techniques and counter
โœ Mark D. Spivey ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Auerbach Publications ๐ŸŒ English

Examining computer security from the hacker's perspective, <em>Practical Hacking Techniques and Countermeasures</em> employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to foll

Ethical Hacking: Techniques, Tools, and
โœ Michael G. Solomon, Sean-Philip Oriyano ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Jones & Bartlett Learning ๐ŸŒ English

<span>Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with nu

Ethical Hacking and Countermeasures: Sec
โœ EC-Council ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Cengage Learning ๐ŸŒ English

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive envir

Ethical Hacking Techniques and Counterme
โœ Nabie Y. Conteh ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› IGI Global ๐ŸŒ English

<p><span>As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber\-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent c