CHAPTER 19
SOCIAL ENGINEERING AND LOW-TECH ATTACKS
Karthik Raman, Susan Baumes, Kevin Beets, and Carl Ness
19.2.2 Kevin Mitnick and the Media
19.2.4 Social Engineering as a Portion of an Attack
19.3 SOCIAL ENGINEERING METHODS
19.3.4 Network and Voice Methods
19.3.5 Reverse Social Engineering
19.4 PSYCHOLOGY AND SOCIAL PSYCHOLOGY OF SOCIAL ENGINEERING
19.4.3 Social Engineer Profile
19.5 DANGERS OF SOCIAL ENGINEERING AND ITS IMPACT ON BUSINESSES
19.5.2 Case Study Examples from Business
19.5.4 Small Businesses versus Large Organizations
19.6.3 Technology for Detection
19.8.2 Technology for Prevention
19.1 INTRODUCTION.
According to Greek mythology, the Greeks defeated the Trojans in the Trojan War with the help of a wooden statue. After fighting a decade-long war in vain, the Greeks withdrew from their stronghold on the beach. Outside the gates of Troy, they left a giant wooden horse. The statue confused the Trojan soldiers, but it was brought within the fortified walls of Troy. Inside the statue hid several Greek soldiers. When darkness fell, ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.