04850nam 22008413u 450 991078128150332120230912123757.01-282-93980-797866129398081-118-02801-5(CKB)2550000000033590(EBL)706746(OCoLC)721323812(SSID)ssj0000475468(PQKBManifestationID)11336980(PQKBTitleCode)TC0000475468(PQKBWorkID)10468857(PQKB)11585411(Au-PeEL)EBL7147497(CaSebORM)9780470639535(MiAaPQ)EBC706746(MiAaPQ)EBC7147497(EXLCZ)99255000000003359020130418d2010|||| u|| |engur|n|---|||||txtccrSocial Engineering[electronic resource] The Art of Human Hacking1st editionChichester Wiley20101 online resource (410 p.)Description based upon print version of record.0-470-63953-9 Social Engineering: The Art of Human Hacking; Contents; Foreword; Preface and Acknowledgments; Chapter 1: A Look into the World of Social Engineering; Why This Book Is So Valuable; Overview of Social Engineering; Summary; Chapter 2: Information Gathering; Gathering Information; Sources for Information Gathering; Communication Modeling; The Power of Communication Models; Chapter 3: Elicitation; What Is Elicitation?; The Goals of Elicitation; Mastering Elicitation; Summary; Chapter 4: Pretexting: How to Become Anyone; What Is Pretexting?; The Principles and Planning Stages of PretextingSuccessful PretextingSummary; Chapter 5: Mind Tricks: Psychological Principles Used in Social Engineering; Modes of Thinking; Microexpressions; Neurolinguistic Programming (NLP); Interview and Interrogation; Building Instant Rapport; The Human Buffer Overflow; Summary; Chapter 6: Influence: The Power of Persuasion; The Five Fundamentals of Influence and Persuasion; Influence Tactics; Altering Reality: Framing; Manipulation: Controlling Your Target; Manipulation in Social Engineering; Summary; Chapter 7: The Tools of the Social Engineer; Physical Tools; Online Information-Gathering ToolsSummaryChapter 8: Case Studies: Dissecting the Social Engineer; Mitnick Case Study 1: Hacking the DMV; Mitnick Case Study 2: Hacking the Social Security Administration; Hadnagy Case Study 1: The Overconfident CEO; Hadnagy Case Study 2: The Theme Park Scandal; Top-Secret Case Study 1: Mission Not Impossible; Top-Secret Case Study 2: Social Engineering a Hacker; Why Case Studies Are Important; Summary; Chapter 9: Prevention and Mitigation; Learning to Identify Social Engineering Attacks; Creating a Personal Security Awareness CultureBeing Aware of the Value of the Information You Are Being Asked ForKeeping Software Updated; Developing Scripts; Learning from Social Engineering Audits; Concluding Remarks; Summary; IndexThe first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick-one of the most famous social engineers in the world-popularized the term "social engineering." He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hackiComputer hackersHuman-computer interactionSocial engineeringSocial engineeringHackersComputer securityHuman-computer interactionSociology & Social HistoryHILCCEngineering & Applied SciencesHILCCSocial SciencesHILCCComputer ScienceHILCCSocial ChangeHILCCComputer hackers.Human-computer interaction.Social engineering.Social engineeringHackersComputer securityHuman-computer interactionSociology & Social HistoryEngineering & Applied SciencesSocial SciencesComputer ScienceSocial Change005.8Hadnagy Christopher873539AU-PeELAU-PeELAU-PeELBOOK9910781281503321Social Engineering2680758UNINA