De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

The Art of Social Engineering

Bag om The Art of Social Engineering

Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest data Understand the evolving implications of social engineering on social networks Implement effective defensive strategies to mitigate the probability and impact of social engineering attacks Purchase of the print or Kindle book includes a free PDF eBook Book Description Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them. The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.What you will learnGrasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.Table of ContentsThe Psychology Behind Social Engineering Understanding Social Engineering Common Scam Attacks Types of Social Engineering Attacks Enhanced Social Engineering Attacks Social Engineering and Social Network Attacks AI-Driven Techniques in Enhanced Social Engineering Attacks The Social Engineering Toolkit (SET) Understanding the Social Engineering Lifecycle Defensive Strategies for Social Engineering Applicable Laws and Regulations for Social Engineering

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9781804613641
  • Indbinding:
  • Paperback
  • Sideantal:
  • 234
  • Udgivet:
  • 20. oktober 2023
  • Størrelse:
  • 191x13x235 mm.
  • Vægt:
  • 446 g.
  • 2-3 uger.
  • 5. december 2024
På lager

Normalpris

Abonnementspris

- Rabat på køb af fysiske bøger
- 1 valgfrit digitalt ugeblad
- 20 timers lytning og læsning
- Adgang til 70.000+ titler
- Ingen binding

Abonnementet koster 75 kr./md.
Ingen binding og kan opsiges når som helst.

Beskrivelse af The Art of Social Engineering

Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest data
Understand the evolving implications of social engineering on social networks
Implement effective defensive strategies to mitigate the probability and impact of social engineering attacks
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.
The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.
You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.
By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.What you will learnGrasp the psychological concepts and principles used in social engineering attacks
Distinguish the different types of social engineering attacks
Examine the impact of social engineering on social networks
Find out how attackers leverage OSINT tools to perform more successful attacks
Walk through the social engineering lifecycle
Get a glimpse of the capabilities of Social Engineering Toolkit (SET)
Who this book is for
This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.Table of ContentsThe Psychology Behind Social Engineering
Understanding Social Engineering
Common Scam Attacks
Types of Social Engineering Attacks
Enhanced Social Engineering Attacks
Social Engineering and Social Network Attacks
AI-Driven Techniques in Enhanced Social Engineering Attacks
The Social Engineering Toolkit (SET)
Understanding the Social Engineering Lifecycle
Defensive Strategies for Social Engineering
Applicable Laws and Regulations for Social Engineering

Brugerbedømmelser af The Art of Social Engineering