Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Art of Social Engineering
  • Table Of Contents Toc
The Art of Social Engineering

The Art of Social Engineering

By : Cesar Bravo, Desilda Toska
4.9 (8)
close
close
The Art of Social Engineering

The Art of Social Engineering

4.9 (8)
By: Cesar Bravo, Desilda Toska

Overview of this book

Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them. The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.
Table of Contents (17 chapters)
close
close
1
Part 1: Understanding Social Engineering
6
Part 2: Enhanced Social Engineering Attacks
11
Part 3: Protecting against Social Engineering Attacks

The history of the social engineering life cycle

Social engineering attacks are intricately linked to the evolution of human communication, and they increase as new ways of communication are used by humans.

In fact, the foundation of social engineering can be traced back to hundreds of years ago when individuals utilized deception and manipulation to gain advantage.

More recent examples include spies assuming false identities, using disguises, or employing persuasive tactics to gather information or achieve their objectives.

Over time, these attacks were perfected, and social engineering attacks became an art. This art is in constant evolution, and we have witnessed how these attacks evolve as technology evolves, from basic attacks of dumpster diving to more sophisticated attacks that now leverage the latest technologies such as the metaverse and even generative AI to better craft the attacks.

Now, as part of this evolution, social engineering attacks have grown in sophistication...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
The Art of Social Engineering
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon