Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Art of Social Engineering
  • Table Of Contents Toc
  • Feedback & Rating feedback
The Art of Social Engineering

The Art of Social Engineering

By : Cesar Bravo, Desilda Toska
4.9 (8)
close
close
The Art of Social Engineering

The Art of Social Engineering

4.9 (8)
By: Cesar Bravo, Desilda Toska

Overview of this book

Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them. The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.
Table of Contents (17 chapters)
close
close
1
Part 1: Understanding Social Engineering
6
Part 2: Enhanced Social Engineering Attacks
11
Part 3: Protecting against Social Engineering Attacks

Summary

In this chapter, you have learned key skills to establish a robust defense against social engineering threats. Recognizing social engineering red flags is crucial, as it enables individuals to identify suspicious behaviors and tactics used by attackers to manipulate people into compromising security.

The chapter has emphasized the importance of conducting employee awareness campaigns, which involve designing effective training programs to educate employees about social engineering techniques and foster a culture of security awareness. Implementing countermeasures, such as MFA and access controls, helps mitigate social engineering risks.

The chapter also highlighted the value of organizing CTF exercises, which provide employees with simulated scenarios to practice identifying and responding to social engineering attacks. Enhancing cybersecurity training was another essential skill we discussed, which involves staying up to date with the latest attack techniques and best...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
The Art of Social Engineering
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon