A Gentle Introduction to Social Engineering Attack and Prevention
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。
-
ナレーター:
-
Timothy Burke
-
著者:
-
Stephen Haunts
このコンテンツについて
Should that delivery man be walking around the office unattended? Has someone just asked you to hold the door, and you don't recognize them? Do you trust that person trying to befriend you in the bar next to the office?
These are all potential social-engineering plays against you by professional criminals.
Social engineering is one of the biggest threats to our organizations today. Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems.
In this audiobook, we will look at some of the techniques used in social engineering and look at how to guard yourself against them. We will cover subjects like:
- Information gathering
- Pretexting
- Elicitation
- Manipulation
- Personal mitigation techniques
- Corporate mitigation techniques
About the author: Stephen Haunts is an experienced software developer with a focus on Microsoft .NET technologies and security for back-end enterprise systems. Stephen is also a Pluralsight author, blogger at stephenhaunts.com, writer, and international conference speaker at events like NDC London, NDC Oslo, NDC Sydney, Techorama, and SDD Conf. Stephen also runs a user group called Derbyshire Dot Net in the UK.
©2008 Stephen Haunts (P)2018 Stephen Haunts