Social engineering penetration testing : executing social engineering pen tests, assessments and defense /
This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate ind...
        Saved in:
      
    
          | Main Authors: | , , | 
|---|---|
| Format: | Book | 
| Language: | English | 
| Published: | 
      Oxford:
        
      Elsevier,    
    
      2014
     | 
| Subjects: | |
| Tags: | 
       Add Tag    
     
      No Tags, Be the first to tag this record!
   
 | 
| Summary: | This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, the reader will have a much better understanding of how best to defend against these attacks. The authors show hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. The book shows how to use widely available open-source tools to conduct pen tests and the practical steps to improve defense measures in response to test results. -- Edited summary from book | 
|---|---|
| Physical Description: | xx, 386 pages; illustrations, 24 cm. | 
| Bibliography: | Includes index. | 
| ISBN: | 9780124201248 | 
