The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity

Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.
The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.
You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.
By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.

1144134458
The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity

Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.
The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.
You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.
By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.

35.99 In Stock
The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity

The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity

The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity

The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity

eBook

$35.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.
The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.
You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.
By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.


Product Details

ISBN-13: 9781804614532
Publisher: Packt Publishing
Publication date: 10/20/2023
Sold by: Barnes & Noble
Format: eBook
Pages: 234
File size: 12 MB
Note: This product may take a few minutes to download.

About the Author

Cesar Bravo is a researcher who created and patented more than 100 inventions related to Cybersecurity in the US, Germany, China, and Japan. Cesar has been working with several universities across the world to teach Cybersecurity at all levels, including a Master Degree in Cybersecurity (in which he also served as thesis director). In recent years Cesar has become a recognized speaker (including a TEDx talk) with international presentations in countries like the UK, Germany, Mexico, the US, and Spain. His last book Mastering Defensive Security was translated into several languages and with thousands of copies sold around the world, it is widely recognized as a must-read book in cybersecurity.
Desilda Toska embarked on her professional journey as a QA engineer, honing her skills through years of dedicated work. Starting out as a consultant, she quickly ascended the ranks to become a first-line manager and eventually assumed the role of the head of the automation practice at IBM CIC Italy. During her IBM journey, she discovered her fervent passion for crafting innovative programs using Arduino technology. This enthusiasm led her to actively contribute to various patents with groundbreaking ideas, particularly in the realm of cybersecurity. Equipped with an unquenchable thirst for knowledge, she earned her M.Sc. degrees from the University of Tirana, Albania, and a Drs degree from the University of Milan, both in computer science.

Table of Contents

Table of Contents
  1. The Psychology Behind Social Engineering
  2. Understanding Social Engineering
  3. Common Scam Attacks
  4. Types of Social Engineering Attacks
  5. Enhanced Social Engineering Attacks
  6. Social Engineering and Social Network Attacks
  7. AI-Driven Techniques in Enhanced Social Engineering Attacks
  8. The Social Engineering Toolkit (SET)
  9. Understanding the Social Engineering Lifecycle
  10. Defensive Strategies for Social Engineering
  11. Applicable Laws and Regulations for Social Engineering
From the B&N Reads Blog

Customer Reviews