Social engineering penetration testing executing social engineering pen tests, assessments and defense

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and...

Descripción completa

Detalles Bibliográficos
Otros Autores: Watson, Gavin, 1982- author (author), Mason, Andrew, author, Ackroyd, Richard, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Massachusetts ; Oxford, England : Syngress 2014.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628194206719
Descripción
Sumario:Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that
Notas:Description based upon print version of record.
Descripción Física:1 online resource (407 p.)
Bibliografía:Includes bibliographical references and index.
ISBN:9780124201828