Social Engineering in IT Security: Tools, Tactics, and Techniques

, by
Social Engineering in IT Security: Tools, Tactics, and Techniques by Conheady, Sharon, 9780071818469
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780071818469 | 0071818464
  • Cover: Paperback
  • Copyright: 8/4/2014

  • Rent

    (Recommended)

    $26.78
     
    Term
    Due
    Price
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.
  • Buy Used

    Usually Ships in 3-5 Business Days

    $28.51
  • Buy New

    Usually Ships in 3-4 Business Days

    $38.41
  • eBook

    eTextBook from VitalSource Icon

    Available Instantly

    Online: 1825 Days

    Downloadable: Lifetime Access

    $44.10

Cutting-edge social engineering testing techniques

"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot

Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.

  • Explore the evolution of social engineering, from the classic con artist to the modern social engineer
  • Understand the legal and ethical aspects of performing a social engineering test
  • Find out why social engineering works from a victim's point of view
  • Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
  • Gather information through research and reconnaissance
  • Create a credible social engineering scenario
  • Execute both on-site and remote social engineering tests
  • Write an effective social engineering report
  • Learn about various tools, including software, hardware, and on-site tools
  • Defend your organization against social engineering attacks

Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button