My Account Log in

1 option

Low tech hacking : street smarts for security professionals / Jack Wiles ... [et al.] ; Neil Wyler, technical editor.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Wiles, Jack.
Contributor:
Wyler, Neil R.
Language:
English
Subjects (All):
Computer security.
Hackers.
Physical Description:
1 online resource (265 p.)
Edition:
1st edition
Place of Publication:
Waltham, Mass. : Elsevier, 2012.
Language Note:
English
System Details:
text file
Summary:
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed desc
Contents:
Front Cover; Low Tech Hacking: Street Smarts for Security Professionals; Copyright; Contents; Acknowledgments; Foreword; About the Authors; Introlduction; Book Overview and Key Learning Points; Book Audience; How this Book is Organized; Chapter 1: Social engineering: The ultimate low tech hacking threat; Chapter 2: Low tech vulnerabilities: Physical security; Chapter 3: More about locks and ways to low tech hack them; Chapter 4: Low tech wireless hacking; Chapter 5: Low tech targeting and surveillance: How much could they find out about you?
Chapter 6: Low tech hacking for the penetration testerChapter 7: Low tech hacking and the law: Where can you go for help?; Chapter 8: Information security awareness training: Your most valuable countermeasure to employee risk; Conclusion; Chapter 1: Social engineering: The ultimate low tech hacking threat; How Easy is it?; The Mind of a Social Engineer; The mind of a victim; Tools of The Social Engineering Trade; One of my favorite tools of the trade; Social engineering would never work against our company; What Was I Able to Social Engineer Out of Mary?
The Final Sting-Two weeks Later-Friday AfternoonWhy did this scam work?; Let's look at a few more social engineering tools; Keystroke logger: Is there one under your desk?; One of my lunchtime tools; Let's look at that Telephone butt-in set on my tool belt; Meet Mr. Phil Drake; Meet Mr. Paul Henry; Traditional AV, IDS, and IPS considerations; Traditional firewall consideration; Flaw remediation; Do you have a guest user of your credit card?; A few possible countermeasures; Always be slightly suspicious; Start to study the art of social engineering; Start a social engineering book library
SummaryChapter 2: Low tech vulnerabilities: Physical security; A mini risk assessment; What did I have at risk?; What were some possible threats while out on the lake?; What were some of the possible vulnerabilities?; And finally, what about my countermeasures?; Outsider-Insider Threats; Some things to consider for the security of your buildings; Check all locks for proper operation; Use employee badges; Shredder technology keeps changing as well; Keep an eye on corporate or agency phone books; Unsecured areas are targets for tailgating; Special training for off-shift staff
Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?; Purchasing better quality locks will be cost effective; Be aware of lock vulnerabilities; Forced entry-and other ways to cheat!
A time-tested low tech method of forced entry
Notes:
Includes index.
Includes bibliographical references and index.
ISBN:
9786613394132
9781283394130
1283394138
9781597496667
1597496669
OCLC:
769344344

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account