The art of social engineering : uncover the secrets behind the human dynamics in cybersecurity

Book Cover
Average Rating
Published
Birmingham : Packt Publishing, 2023.
Status
Available Online

Description

Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guide Key Features Gain insights into the open source intelligence (OSINT) methods used by attackers to harvest data Understand the evolving implications of social engineering on social networks Implement effective defensive strategies to mitigate the probability and impact of social engineering attacks Purchase of the print or Kindle book includes a free PDF eBook Book Description Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them. The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal. What you will learn Grasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.

More Details

Format
Edition
1st edition.
Language
English
ISBN
9781804614532, 180461453X

Notes

Description
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guide Key Features Gain insights into the open source intelligence (OSINT) methods used by attackers to harvest data Understand the evolving implications of social engineering on social networks Implement effective defensive strategies to mitigate the probability and impact of social engineering attacks Purchase of the print or Kindle book includes a free PDF eBook Book Description Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them. The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal. What you will learn Grasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Table of Contents

Cover
Title Page
Copyright and Credits
Foreword
Contributors
Table of Contents
Preface
Part 1: Understanding Social Engineering
Chapter 1: The Psychology behind Social Engineering
Technical requirements
Disclaimer
Understanding the art of manipulation
Examining the six principles of persuasion
Developing rapport
Using appropriate body language
Using your knowledge to help
Complimenting
Supporting other points of view
Leveraging empathy
Leveraging influence for defensive security
Summary
Further reading
Chapter 2: Understanding Social Engineering
Technical requirements
Detecting social engineering attacks
Social media attacks
The lost passport
The federal government grant
Romance scam
Fake investment
Fake advertisements
Social engineering and the crypto scam
Summary
Chapter 3: Common Scam Attacks
Technical requirements
What is a scam?
The Nigerian scam (419)
The history of the scam
Identifying the Nigerian scam
Types of Nigerian scams
Funny Nigerian scams
Avoiding these scams
Other scams
The investor scam
The Business Email Compromise scam
Fraud compensation
Scambaiting
Summary
Chapter 4: Types of Social Engineering Attacks
Technical requirements
Disclaimer
Phishing attacks
History of phishing attacks
Famous phishing attacks
Types of phishing attacks
Baiting
Physical baiting
Cyber baiting
Protecting yourself against baiting
Dumpster diving
Tailgating
Quid pro quo
Free tech support
Free software to download
How to protect yourself against quid pro quo attacks
Pretexting
Fake job offers
False charities
Watering hole
Crypto mining
Summary
Further reading
Part 2: Enhanced Social Engineering Attacks
Chapter 5: Enhanced Social Engineering Attacks
Technical requirements
Disclaimer
Targeted attacks
Identifying high-value targets
OSINT
OSINT tools
OSINT methods
OSINT use cases
Web-based attacks
Fake logins
Fake updates
Scareware
Fake pages
Magic-ware
Hacking-ware
Gaming-based attacks
Forum-based attacks
Adware
Summary
Chapter 6: Social Engineering and Social Network Attacks
Disclaimer
Social engineering through mobile applications
Malicious apps and app-based attacks
Exploiting app permissions for data access
The challenges in identifying and mitigating such attacks
Social engineering via social networks
Clickbait attack
WhatsApp-based attacks
Instagram-based attacks
Other attacks
Sextortion
Fake news attacks
Forex scams
Summary
Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks
Technical requirements
Artificial intelligence in social engineering attacks
The growing role of AI in social engineering
AI-driven social engineering techniques

Discover More

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Bravo, C. (. e., & Toska, D. (2023). The art of social engineering: uncover the secrets behind the human dynamics in cybersecurity (1st edition.). Packt Publishing.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Bravo, Cesar (Cybersecurity expert) and Desilda, Toska. 2023. The Art of Social Engineering: Uncover the Secrets Behind the Human Dynamics in Cybersecurity. Birmingham: Packt Publishing.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Bravo, Cesar (Cybersecurity expert) and Desilda, Toska. The Art of Social Engineering: Uncover the Secrets Behind the Human Dynamics in Cybersecurity Birmingham: Packt Publishing, 2023.

Harvard Citation (style guide)

Bravo, C. (. e. and Toska, D. (2023). The art of social engineering: uncover the secrets behind the human dynamics in cybersecurity. 1st edn. Birmingham: Packt Publishing.

MLA Citation, 9th Edition (style guide)

Bravo, Cesar (Cybersecurity expert),, and Desilda Toska. The Art of Social Engineering: Uncover the Secrets Behind the Human Dynamics in Cybersecurity 1st edition., Packt Publishing, 2023.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
de29d02b-66bb-8857-d191-a6aee3f3f5fc-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work IDde29d02b-66bb-8857-d191-a6aee3f3f5fc-eng
Full titleart of social engineering uncover the secrets behind the human dynamics in cybersecurity
Authorbravo cesar
Grouping Categorybook
Last Update2025-01-24 12:33:29PM
Last Indexed2025-05-03 03:36:26AM

Book Cover Information

Image Sourcegoogle_isbn
First LoadedFeb 22, 2024
Last UsedJan 28, 2025

Marc Record

First DetectedNov 20, 2023 01:23:52 PM
Last File Modification TimeDec 17, 2024 08:25:44 AM
SuppressedRecord had no items

MARC Record

LEADER07459cam a22004937i 4500
001on1406832446
003OCoLC
00520241217082453.0
006m     o  d        
007cr cnu---unuuu
008231031s2023    enk     o     000 0 eng d
019 |a 1402144495
020 |a 9781804614532
020 |a 180461453X
035 |a (OCoLC)1406832446|z (OCoLC)1402144495
037 |a 9781804613641|b O'Reilly Media
040 |a ORMDA|b eng|e rda|e pn|c ORMDA|d OCLKB|d EBLCP|d OCLCO|d OCLCQ|d UKAHL|d UPM|d OCLCQ|d TOH|d OCLCF|d OCLCQ|d OCLCO
049 |a MAIN
050 4|a QA76.9.A25
08204|a 005.8|2 23/eng/20231031
1001 |a Bravo, Cesar|c (Cybersecurity expert),|e author.
24514|a The art of social engineering :|b uncover the secrets behind the human dynamics in cybersecurity /|c Cesar Bravo, Desilda Toska.
250 |a 1st edition.
264 1|a Birmingham :|b Packt Publishing,|c 2023.
300 |a 1 online resource (1 volume)
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
5050 |a Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding Social Engineering -- Chapter 1: The Psychology behind Social Engineering -- Technical requirements -- Disclaimer -- Understanding the art of manipulation -- Examining the six principles of persuasion -- Developing rapport -- Using appropriate body language -- Using your knowledge to help -- Complimenting -- Supporting other points of view -- Leveraging empathy -- Leveraging influence for defensive security -- Summary -- Further reading
5058 |a Chapter 2: Understanding Social Engineering -- Technical requirements -- Detecting social engineering attacks -- Social media attacks -- The lost passport -- The federal government grant -- Romance scam -- Fake investment -- Fake advertisements -- Social engineering and the crypto scam -- Summary -- Chapter 3: Common Scam Attacks -- Technical requirements -- What is a scam? -- The Nigerian scam (419) -- The history of the scam -- Identifying the Nigerian scam -- Types of Nigerian scams -- Funny Nigerian scams -- Avoiding these scams -- Other scams -- The investor scam
5058 |a The Business Email Compromise scam -- Fraud compensation -- Scambaiting -- Summary -- Chapter 4: Types of Social Engineering Attacks -- Technical requirements -- Disclaimer -- Phishing attacks -- History of phishing attacks -- Famous phishing attacks -- Types of phishing attacks -- Baiting -- Physical baiting -- Cyber baiting -- Protecting yourself against baiting -- Dumpster diving -- Tailgating -- Quid pro quo -- Free tech support -- Free software to download -- How to protect yourself against quid pro quo attacks -- Pretexting -- Fake job offers -- False charities -- Watering hole
5058 |a Crypto mining -- Summary -- Further reading -- Part 2: Enhanced Social Engineering Attacks -- Chapter 5: Enhanced Social Engineering Attacks -- Technical requirements -- Disclaimer -- Targeted attacks -- Identifying high-value targets -- OSINT -- OSINT tools -- OSINT methods -- OSINT use cases -- Web-based attacks -- Fake logins -- Fake updates -- Scareware -- Fake pages -- Magic-ware -- Hacking-ware -- Gaming-based attacks -- Forum-based attacks -- Adware -- Summary -- Chapter 6: Social Engineering and Social Network Attacks -- Disclaimer -- Social engineering through mobile applications
5058 |a Malicious apps and app-based attacks -- Exploiting app permissions for data access -- The challenges in identifying and mitigating such attacks -- Social engineering via social networks -- Clickbait attack -- WhatsApp-based attacks -- Instagram-based attacks -- Other attacks -- Sextortion -- Fake news attacks -- Forex scams -- Summary -- Chapter 7: AI-Driven Techniques in Enhanced Social Engineering Attacks -- Technical requirements -- Artificial intelligence in social engineering attacks -- The growing role of AI in social engineering -- AI-driven social engineering techniques
520 |a Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guide Key Features Gain insights into the open source intelligence (OSINT) methods used by attackers to harvest data Understand the evolving implications of social engineering on social networks Implement effective defensive strategies to mitigate the probability and impact of social engineering attacks Purchase of the print or Kindle book includes a free PDF eBook Book Description Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them. The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal. What you will learn Grasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.
588 |a Description based on print version record.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Computer security|x Social aspects.
650 0|a Business enterprises|x Security measures.
7001 |a Toska, Desilda,|e author.
77608|i Print version:|a Bravo, Cesar (Cybersecurity expert).|t Art of social engineering.|d Birmingham : Packt Publishing, 2023|z 9781804613641|w (OCoLC)1400796909
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781804613641/?ar|x O'Reilly|z eBook
938 |b OCKB|z netlibrary.ebooks,e1b46344-a314-454e-95bb-34eab55c1c9c-emi
994 |a 92|b VIA
999 |c 329748|d 329748