|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910953404303321 |
|
|
Autore |
Mann Ian |
|
|
Titolo |
Hacking the human : social engineering techniques and security countermeasures / / Ian Mann |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Aldershot, : Ashgate, c2008 |
|
|
|
|
|
|
|
ISBN |
|
1-351-15686-1 |
1-281-83424-6 |
9786611834241 |
0-7546-9351-1 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (267 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Social engineering |
Social systems - Planning |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
What is social engineering? -- Understanding your risks -- People, your weakest link -- Limitations to current security thinking -- Trust me -- Reading a person -- Subconscious mind -- Parent, adult, child -- Vulnerability mapping -- Protection systems -- Awareness and training -- Testing. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. |
|
|
|
|