The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity
by: Cesar Bravo (Author), Desilda Toska (Author), Rhonda Childress (Foreword)
Publisher finelybook 出版社: Packt Publishing (October 20, 2023)
Language 语言: English
Print Length 页数: 234 pages
ISBN-10: 1804613649
ISBN-13: 9781804613641
Book Description
By finelybook
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guide
Key Features
Gain insights into the open source intelligence (OSINT) methods used by attackers to harvest data
Understand the evolving implications of social engineering on social networks
Implement effective defensive strategies to mitigate the probability and impact of social engineering attacks
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
By finelybook
Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.
The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.
You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.
By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.
What you will learn
Grasp the psychological concepts and principles used in social engineering attacks
Distinguish the different types of social engineering attacks
Examine the impact of social engineering on social networks
Find out how attackers leverage OSINT tools to perform more successful attacks
Walk through the social engineering lifecycle
Get a glimpse of the capabilities of Social Engineering Toolkit (SET)
Who this book is for
This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.
Table of Contents
1. The Psychology Behind Social Engineering
2. Underst anding Social Engineering
3. Common Scam Attacks
4. Types of Social Engineering Attacks
5. Enhanced Social Engineering Attacks
6. Social Engineering and Social Network Attacks
7. Al-Driven Techniques in Enhanced Social Engineering Attacks
8. The Social Engineering Toolkit (SET)
9. Underst anding the Social Engineering Lifecycle
10. Defensive Strategies for Social Engineering
11. Applicable Laws and Regulations for Social Engineering
Review
“This book offers more than just a glimpse into the techniques used by social engineers; it serves as a comprehensive guide, a deep dive into the intricate web of tactics, strategies, and real-world examples. Whether you’re a seasoned security expert, a business owner trying to safeguard your assets, or just a curious reader, there’s something in these pages for you.
Bravo and Toska have not merely presented a manual; they’ve crafted a masterpiece. They have blended their profound knowledge with engaging narratives, making complex concepts digestible and relatable. It’s a journey through the delicate balance between trust and caution, intuition and investigation, safety and vulnerability.”
—
Rhonda Childress, VP and Chief Innovation Officer Security and Resiliency at Kyndryl, Kyndryl Fellow IBM Fellow Emeritus
About the Author
Cesar Bravo is a researcher who created and patented more than 100 inventions related to Cybersecurity in the US, Germany, China, and Japan.
Cesar has been working with several universities across the world to teach Cybersecurity at all levels, including a Master Degree in Cybersecurity (in which he also served as thesis director).
In recent years Cesar has become a recognized speaker (including a TEDx talk) with international presentations in countries like the UK, Germany, Mexico, the US, and Spain. His last book Mastering Defensive Security was translated into several languages and with thousands of copies sold around the world, it is widely recognized as a must-read book in cybersecurity.
Desilda Toska embarked on her professional journey as a QA engineer, honing her skills through years of dedicated work. Starting out as a consultant, she quickly ascended the ranks to become a first-line manager and eventually assumed the role of the head of the automation practice at IBM CIC Italy. During her IBM journey, she discovered her fervent passion for crafting innovative programs using Arduino technology. This enthusiasm led her to actively contribute to various patents with groundbreaking ideas, particularly in the realm of cybersecurity. Equipped with an unquenchable thirst for knowledge, she earned her M.Sc. degrees from the University of Tirana, Albania, and a Drs degree from the University of Milan, both in computer science. Amazon page