Social engineering penetration testing: executing social engineering pen tests, assessments and defense

This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate ind...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Beteiligte Personen: Watson, Gavin 1982- (VerfasserIn), Mason, Andrew G. (VerfasserIn), Ackroyd, Richard (VerfasserIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Waltham, Massachusetts Syngress 2014
Schlagwörter:
Links:https://learning.oreilly.com/library/view/-/9780124201248/?ar
Zusammenfassung:This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, the reader will have a much better understanding of how best to defend against these attacks. The authors show hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. The book shows how to use widely available open-source tools to conduct pen tests and the practical steps to improve defense measures in response to test results. --
Beschreibung:Includes bibliographical references and index. - Print version record
Umfang:1 Online-Ressource illustrations
ISBN:9780124201828
0124201822
1306642329
9781306642323
0124201245
9780124201248