1 / 267
文档名称:

Mann - Hacking the Human - Social Engineering Techniques and Security Countermeasures (Gower, 2008).pdf

格式:pdf   页数:267
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Mann - Hacking the Human - Social Engineering Techniques and Security Countermeasures (Gower, 2008).pdf

上传人:bolee65 2014/7/17 文件大小:0 KB

下载得到文件列表

Mann - Hacking the Human - Social Engineering Techniques and Security Countermeasures (Gower, 2008).pdf

文档介绍

文档介绍:Hacking the Human
This book is dedicated to
Ravinder, Alec, Oscar, and Mia
Hacking the Human
Social Engineering Techniques and
Security Countermeasures
IAN MANN
© Ian Mann 2008
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior
permission of the publisher.
Published by
Gower Publishing Limited
Gower House
Croft Road
Aldershot
Hampshire GU11 3HR
England
Gower pany
Suite 420
101 Cherry Street
Burlington, VT 05401-4405
USA
Ian Mann has asserted his moral right under the Copyright, Designs and Patents Act, 1988, to be identified
as the author of this work.
British Library Cataloguing in Publication Data
Mann, Ian
Hacking the human : social engineering techniques and
security countermeasures
1. Social engineering 2. Social systems - Planning
3. Business enterprises - Security measures
I. Title
’7
ISBN: 978-0-566-08773-8
Library of Congress Cataloging-in-Publication Data
Mann, Ian.
Hacking the human : social engineering techniques and security countermeasures / by Ian Mann.
p. cm.
Includes index.
ISBN 978-0-566-08773-8
1. Social engineering. 2. Social systems--Planning. I. Title.
2009
’7--dc22
2008019977
Contents
List of Figures ix
Introduction 1
SECTION 1: THE RISKS
Chapter 1 What is Social Engineering? 11
Social Engineering Threats 15
Measurement of Security Controls 20
Chapter 2 Understanding Your Risks 23
Defining Social Engineering Risk 23
Foundation Approach 32
Standardized Approach 33
Quantitative Approach 36
Chapter 3 People, Your Weakest Link 39
Social Engineering Vulnerabilities 39
The Risks Associated with Vulnerabilities 43
Aacking CriticalX 46
Chapter 4 Limitations to Current Security Thinking 63
Information Security Vendors 63
Organizational Structure 63
Security Professionals