LEADER 03681nam 2200697Ia 450 001 9910953404303321 005 20251117004242.0 010 $a1-351-15686-1 010 $a1-281-83424-6 010 $a9786611834241 010 $a0-7546-9351-1 035 $a(CKB)1000000000554960 035 $a(OCoLC)503445708 035 $a(CaPaEBR)ebrary10254941 035 $a(SSID)ssj0000741099 035 $a(PQKBManifestationID)12348757 035 $a(PQKBTitleCode)TC0000741099 035 $a(PQKBWorkID)10701920 035 $a(PQKB)11167132 035 $a(SSID)ssj0000166816 035 $a(PQKBManifestationID)11924579 035 $a(PQKBTitleCode)TC0000166816 035 $a(PQKBWorkID)10168724 035 $a(PQKB)11785642 035 $a(MiAaPQ)EBC438809 035 $a(Au-PeEL)EBL438809 035 $a(CaPaEBR)ebr10254941 035 $a(CaONFJC)MIL183424 035 $a(OCoLC)320277573 035 $a(MiAaPQ)EBC7270794 035 $a(BIP)69347612 035 $a(BIP)34155549 035 $a(EXLCZ)991000000000554960 100 $a20080503d2008 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacking the human $esocial engineering techniques and security countermeasures /$fIan Mann 210 $aAldershot $cAshgate$dc2008 215 $a1 online resource (267 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a1-4094-0958-9 311 08$a0-566-08773-1 320 $aIncludes bibliographical references and index. 327 $aWhat is social engineering? -- Understanding your risks -- People, your weakest link -- Limitations to current security thinking -- Trust me -- Reading a person -- Subconscious mind -- Parent, adult, child -- Vulnerability mapping -- Protection systems -- Awareness and training -- Testing. 330 $aInformation security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read. 606 $aSocial engineering 606 $aSocial systems$xPlanning 615 0$aSocial engineering. 615 0$aSocial systems$xPlanning. 676 $a658.4/7 700 $aMann$b Ian$01865453 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910953404303321 996 $aHacking the human$94472552 997 $aUNINA