03681nam 2200697Ia 450 991095340430332120251117004242.01-351-15686-11-281-83424-697866118342410-7546-9351-1(CKB)1000000000554960(OCoLC)503445708(CaPaEBR)ebrary10254941(SSID)ssj0000741099(PQKBManifestationID)12348757(PQKBTitleCode)TC0000741099(PQKBWorkID)10701920(PQKB)11167132(SSID)ssj0000166816(PQKBManifestationID)11924579(PQKBTitleCode)TC0000166816(PQKBWorkID)10168724(PQKB)11785642(MiAaPQ)EBC438809(Au-PeEL)EBL438809(CaPaEBR)ebr10254941(CaONFJC)MIL183424(OCoLC)320277573(MiAaPQ)EBC7270794(BIP)69347612(BIP)34155549(EXLCZ)99100000000055496020080503d2008 uy 0engurcn|||||||||txtccrHacking the human social engineering techniques and security countermeasures /Ian MannAldershot Ashgatec20081 online resource (267 p.) Bibliographic Level Mode of Issuance: Monograph1-4094-0958-9 0-566-08773-1 Includes bibliographical references and index.What is social engineering? -- Understanding your risks -- People, your weakest link -- Limitations to current security thinking -- Trust me -- Reading a person -- Subconscious mind -- Parent, adult, child -- Vulnerability mapping -- Protection systems -- Awareness and training -- Testing.Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.Social engineeringSocial systemsPlanningSocial engineering.Social systemsPlanning.658.4/7Mann Ian1865453MiAaPQMiAaPQMiAaPQBOOK9910953404303321Hacking the human4472552UNINA