Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Social Engineering in IT Security: Tools, Tactics, and Techniques

    Posted By: IrGens
    Social Engineering in IT Security: Tools, Tactics, and Techniques

    Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady
    English | July 14, 2014 | ISBN: 0071818464 | True EPUB | 272 pages | 9.5 MB

    Cutting-edge social engineering testing techniques

    Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.

    • Explore the evolution of social engineering, from the classic con artist to the modern social engineer
    • Understand the legal and ethical aspects of performing a social engineering test
    • Find out why social engineering works from a victim's point of view
    • Plan a social engineering test–perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
    • Gather information through research and reconnaissance
    • Create a credible social engineering scenario
    • Execute both on-site and remote social engineering tests
    • Write an effective social engineering report
    • Learn about various tools, including software, hardware, and on-site tools
    • Defend your organization against social engineering attacks