Home Page Icon
Home Page
Table of Contents for
2. the art of the attacker
Close
2. the art of the attacker
by Steve Wozniak, William L. Simon, Kevin D. Mitnick
The Art of Deception: Controlling the Human Element of Security
Copyright
Social Engineering
foreword
preface
STARTING OUT
From Phone Phreak to Hacker
Becoming a Social Engineer
FINAL THOUGHTS
introduction
1. behind the scenes
1. Security's Weakest Link
1.1. THE HUMAN FACTOR
1.2. A CLASSIC CASE OF DECEPTION
1.3. THE NATURE OF THE THREAT
1.4. ABUSE OF TRUST
1.5. TERRORISTS AND DECEPTION
1.6. ABOUT THIS BOOK
2. the art of the attacker
2. When Innocuous Information Isn't
2.1. THE HIDDEN VALUE OF INFORMATION
2.2. CREDITCHEX
2.3. THE ENGINEER TRAP
2.4. MORE "WORTHLESS" INFO
2.5. PREVENTING THE CON
3. The Direct Attack: Just Asking for It
3.1. AN MLAC QUICKIE
3.2. YOUNG MAN ON THE RUN
3.3. ON THE DOORSTEP
3.4. GAS ATTACK
3.5. PREVENTING THE CON
4. Building Trust
4.1. TRUST: THE KEY TO DECEPTION
4.2. VARIATION ON A THEME: CARD CAPTURE
4.3. THE ONE-CENT CELL PHONE
4.4. HACKING INTO THE FEDS
4.5. PREVENTING THE CON
5. "Let Me Help You"
5.1. THE NETWORK OUTAGE
5.2. A LITTLE HELP FOR THE NEW GAL
5.3. NOT AS SAFE AS YOU THINK
5.4. PREVENTING THE CON
6. "Can You Help Me?"
6.1. THE OUT-OF-TOWNER
6.2. SPEAKEASY SECURITY
6.3. THE CARELESS COMPUTER MANAGER
6.4. PREVENTING THE CON
7. Phony Sites and Dangerous Attachments
7.1. "WOULDN'T YOU LIKE A FREE (BLANK)?"
7.2. MESSAGE FROM A FRIEND
7.3. VARIATIONS ON A THEME
7.4. VARIATIONS ON THE VARIATION
8. Using Sympathy, Guilt, and Intimidation
8.1. A VISIT TO THE STUDIO
8.2. "DO IT NOW"
8.3. "MR. BIGG WANTS THIS"
8.4. WHAT THE SOCIAL SECURITY ADMINISTRATION KNOWS ABOUT YOU
8.5. ONE SIMPLE CALL
8.6. THE POLICE RAID
8.7. TURNING THE TABLES
8.8. PREVENTING THE CON
9. The Reverse Sting
9.1. THE ART OF FRIENDLY PERSUASION
9.2. COPS AS DUPES
9.3. PREVENTING THE CON
3. intruder alert
10. Entering the Premises
10.1. THE EMBARRASSED SECURITY GUARD
10.2. DUMPSTER DIVING
10.3. THE HUMILIATED BOSS
10.4. THE PROMOTION SEEKER
10.5. SNOOPING ON KEVIN
10.6. PREVENTING THE CON
11. Combining Technology and Social Engineering
11.1. HACKING BEHIND BARS
11.2. THE SPEEDY DOWNLOAD
11.3. EASY MONEY
11.4. THE DICTIONARY AS AN ATTACK TOOL
11.5. PREVENTING THE CON
12. Attacks on the Entry-Level Employee
12.1. THE HELPFUL SECURITY GUARD
12.2. THE EMERGENCY PATCH
12.3. THE NEW GIRL
12.4. PREVENTING THE CON
13. Clever Cons
13.1. THE MISLEADING CALLER ID
13.2. VARIATION: THE PRESIDENT OF THE UNITED STATES IS CALLING
13.3. THE INVISIBLE EMPLOYEE
13.4. THE HELPFUL SECRETARY
13.5. TRAFFIC COURT
13.6. SAMANTHA'S REVENGE
13.7. PREVENTING THE CON
14. Industrial Espionage
14.1. VARIATION ON A SCHEME
14.2. THE NEW BUSINESS PARTNER
14.3. LEAPFROG
14.4. PREVENTING THE CON
4. raising the bar
15. Information Security Awareness and Training
15.1. SECURITY THROUGH TECHNOLOGY, TRAINING, AND PROCEDURES
15.2. UNDERSTANDING HOW ATTACKERS TAKE ADVANTAGE OF HUMAN NATURE
15.3. CREATING TRAINING AND AWARENESS PROGRAMS
15.4. TESTING
15.5. ONGOING AWARENESS
15.6. WHAT'S IN IT FOR ME?
16. Recommended Corporate Information Security Policies
16.1. WHAT IS A SECURITY POLICY?
16.2. DATA CLASSIFICATION
16.3. VERIFICATION AND AUTHORIZATION PROCEDURES
16.4. MANAGEMENT POLICIES
16.5. INFORMATION TECHNOLOGY POLICIES
16.6. POLICIES FOR ALL EMPLOYEES
16.7. POLICIES FOR TELECOMMUTERS
16.8. POLICIES FOR HUMAN RESOURCES
16.9. POLICIES FOR PHYSICAL SECURITY
16.10. POLICIES FOR RECEPTIONISTS
16.11. POLICIES FOR THE INCIDENT REPORTING GROUP
Security at a Glance
IDENTIFYING A SECURITY ATTACK
VERIFICATION AND DATA CLASSIFICATION
sources
CHAPTER 1
CHAPTER 2
CHAPTER 16
CHAPTER 17
Acknowledgments
FROM KEVIN MITNICK
FROM BILL SIMON
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
1. Security's Weakest Link
Next
Next Chapter
2. When Innocuous Information Isn't
Part 2. the art of the attacker
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset