The Art of Social Engineering

The Art of Social Engineering

Cesar Bravo / Desilda Toska

61,44 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2023
Materia
Guías de Internet y servicios en línea
ISBN:
9781804613641
61,44 €
IVA incluido
Disponible

Selecciona una librería:

  • Donde los libros
  • Librería 7artes
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest dataUnderstand the evolving implications of social engineering on social networksImplement effective defensive strategies to mitigate the probability and impact of social engineering attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSocial engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.What you will learnGrasp the psychological concepts and principles used in social engineering attacksDistinguish the different types of social engineering attacksExamine the impact of social engineering on social networksFind out how attackers leverage OSINT tools to perform more successful attacksWalk through the social engineering lifecycleGet a glimpse of the capabilities of Social Engineering Toolkit (SET)Who this book is forThis book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.Table of ContentsThe Psychology Behind Social EngineeringUnderstanding Social EngineeringCommon Scam AttacksTypes of Social Engineering AttacksEnhanced Social Engineering AttacksSocial Engineering and Social Network AttacksAI-Driven Techniques in Enhanced Social Engineering AttacksThe Social Engineering Toolkit (SET)Understanding the Social Engineering LifecycleDefensive Strategies for Social EngineeringApplicable Laws and Regulations for Social Engineering

Artículos relacionados

  • Network Architect’s Handbook
    Alim H. Ali
    Follow a step-by-step roadmap to developing essential competencies in network architecture design, relationship management, systems, and services, coupled with certification guidance and expert tipsKey FeaturesGrasp the big picture of information technology infrastructure to become a successful network architectOvercome challenges in network performance and configuration manage...
    Disponible

    76,54 €

  • Defending APIs
    Colin Domoney
    Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIsKey FeaturesDevelop a profound understanding of the inner workings of APIs with a sharp focus on securityLearn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratoryMaster the art of building robust AP...
    Disponible

    56,57 €

  • The Digital Humanities
    Eileen Gardiner / Ronald G. Musto / Ronald GMusto
    ...
    Disponible

    35,57 €

  • The Digital Humanities
    Eileen Gardiner / Ronald G. Musto / Ronald GMusto
    ...
    Disponible

    130,14 €

  • Discovering and Using Historical Geographic Resources on the Web
    Eva Dodsworth / Eva H. Dodsworth / Eva HDodsworth / L. W. Laliberté / LWLaliberté
    Historical geographic material, like maps, plans, and air photos, although collected and persevered by libraries, archives, and other heritage organizations, are often hidden from the general public. They can be difficult to find, access, and use. Fortunately, these caches of cartographic gems have been recognized and valued for their significant contribution to research. As a ...
    Disponible

    99,52 €

  • The United States Government Internet Directory 2019
    Mary Meghan Ryan
    The United States Government Internet Directory serves as a guide to the changing landscape of government information online. The Directory is an indispensable guidebook for anyone who is looking for official U.S. government resources on the Web. ...
    Disponible

    106,82 €