Coverart for item
The Resource Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]

Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]

Label
Low tech hacking : street smarts for security professionals
Title
Low tech hacking
Title remainder
street smarts for security professionals
Statement of responsibility
Jack Wiles ... [et al.]
Contributor
Subject
Language
eng
Dewey number
005.8
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Wiles, Jack
  • Gudaitis, Terry
  • Jabbusch, Jennifer
  • Rogers, Russ
  • Lowther, Sean
http://library.link/vocab/subjectName
  • Computer hackers
  • Computer security
Label
Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]
Instantiates
Publication
Note
Includes index
Bibliography note
Includes bibliographical references and index
Contents
  • Machine generated contents note: ch. 1 Social engineering: The ultimate low tech hacking threat -- How easy is it? -- The mind of a social engineer -- The mind of a victim -- Tools of the social engineering trade -- One of my favorite tools of the trade -- Social engineering would never work against our company -- What was I able to social engineer out of Mary? -- The final sting---two weeks later---Friday afternoon -- Why did this scam work? -- Let's look at a few more social engineering tools -- Keystroke logger---Is there one under your desk? -- One of my lunchtime tools -- Let's look at that telephone butt-in set on my tool belt -- Meet Mr. Phil Drake -- Meet Mr. Paul Henry -- Traditional AV, IDS, and IPS considerations -- Traditional firewall consideration -- Flaw remediation -- Do you have a guest user of your credit card? -- A few possible countermeasures -- Always be slightly suspicious -- Start to study the art of social engineering --
  • Contents note continued: Start a social engineering book library -- Summary -- ch. 2 Low tech vulnerabilities: Physical security -- A mini risk assessment -- What did I have at risk? -- What were some possible threats while out on the lake? -- What were some of the possible vulnerabilities? -- And finally, what about my countermeasures? -- Outsider---Insider threats -- Some things to consider for the security of your buildings? -- Check all locks for proper operation -- Use employee badges -- Shredder technology keeps changing as well -- Keep an eye on corporate or agency phone books -- Unsecured areas are targets for tailgating -- Special training for off-shift staff -- Bomb threats in Chicago -- Check those phone closets -- Remove a few door signs -- Review video security logs -- Consider adding motion-sensing lights -- Subterranean vulnerabilities -- Clean out your elephant burial ground -- Spot check those drop ceilings -- Internal auditors are your friends --
  • Contents note continued: Bonus: Home security tips -- Summary -- ch. 3 More about locks and ways to low tech hack them -- A little more about locks and lock picking -- What kinds of locks are the most popular? -- Purchasing better quality locks will be cost effective -- Be aware of lock vulnerabilities -- Forced entry---and other ways to cheat! -- A time-tested low tech method of forced entry -- Let's break into a semi-high security room -- Retracting the bolt to open the door -- Gaining access to the lock itself -- Keys and key control -- Social engineering and key access -- Who has the keys to your kingdom -- Special key control awareness training -- Bait and switch war story that could happen to you -- Padlock shims are not a new threat -- Some places to go to learn and have some fun -- My 110-year-old puzzle -- More about keys and how to make one if you don't have one -- Five pounds of my favorite keys -- Ways to make a key if you didn't bring a key machine --
  • Contents note continued: One final lock to talk about and then we're done -- Rim cylinder locks vs. mortise cylinder locks -- Summary -- ch. 4 Low tech wireless hacking -- Wireless 101: The electromagnetic spectrum -- Why securing wireless is hard -- 802.11 and Bluetooth low tech hacks -- DoS and availability -- Layer 1 DoS attacks -- Layer 2 DoS attacks -- Backdoors and cracks -- Crack attack -- Tap, tap. Mirror, mirror ... on the wallplate -- Guesssst who got in -- Peer-to-peer-to-hack -- Ad hoc, ad finem -- Going rogue -- Marveling at the gambit of rogues -- New SSID on the street -- It's a bird ... it's a plane ... it's a Rogue? -- Bridge bereavement -- Assault by defaults -- Open sesame -- Default WPA keys -- More Google hacking -- Bypassing specific security tools -- Going static -- Counterfeit MACs -- MAC switcharoo -- <html>Free Wi-Fi</html> -- Summary -- ch. 5 Low tech targeting and surveillance: How much could they find out about you? -- Initial identification --
  • Contents note continued: Property records, employment, and neighborhood routes -- Disclosure on social networks and social media -- Financials, investments, and purchase habits -- Frequented locations and travel patterns -- Third party disclosures -- Use of signatures -- Automated surveillance -- Target interaction -- Scanners and miniatures -- Summary and recommendations -- Recommendations -- ch. 6 Low tech hacking for the penetration tester -- The human condition -- Selective attention -- Magic is distraction -- Building trust and influencing behavior -- Technology matters -- USB thumb drives -- CDs and DVDs -- Staging the effort -- Target organization -- Getting things in order -- Deciding on location -- Choosing the strategy -- Choosing the technology -- A useful case study -- Approaching hotel staff -- Approaching conference staff -- Conclusion -- Summary -- ch. 7 Low tech hacking and the law: Where can you go for help? -- Meet Mr. Tony Marino --
  • Contents note continued: Low tech hacking interview with Tony Marino, U.S. Secret Service (retired) -- Meet Special Agent (SA) Gregory K. Baker, FBI -- Low tech hacking interview with Special Agent (SA) Gregory K. Baker, FBI -- Summary -- ch. 8 Information security awareness training: Your most valuable countermeasure to employee risk -- An introduction to information security awareness -- The people and personalities of information security awareness -- Data theft and employee awareness -- Designing an effective information security awareness program -- Repetition is the aide to memory -- Touch points -- To team or not to team, that is the question -- Creating a business plan for your Information Security Awareness Program -- The presentation -- Components of an awareness program -- Next steps -- The Classification of Data Matrix -- Manager's Quick Reference Guide -- Finding materials for your program -- The importance of a good editor --
  • Contents note continued: Implementing an information security awareness program -- Who writes the awareness standard? -- Finding win-win solutions -- Building a perpetual awareness program -- Who should take the training? -- Getting the program off the ground -- Making information security accessible -- A lesson learned -- The dollars and cents of your program -- Above and beyond -- Making security part of the company mind-set -- The importance of communication with other lines-of-businesses -- Let's talk more about alliances -- Keeping your program viable -- Other resources -- Measuring your program's success -- Identifying key components and cumulative results -- Summary
Control code
000048533835
Dimensions
23.5 cm.
Extent
xix, 243 p.
Isbn
9781597496650
Other physical details
ill.
Label
Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]
Publication
Note
Includes index
Bibliography note
Includes bibliographical references and index
Contents
  • Machine generated contents note: ch. 1 Social engineering: The ultimate low tech hacking threat -- How easy is it? -- The mind of a social engineer -- The mind of a victim -- Tools of the social engineering trade -- One of my favorite tools of the trade -- Social engineering would never work against our company -- What was I able to social engineer out of Mary? -- The final sting---two weeks later---Friday afternoon -- Why did this scam work? -- Let's look at a few more social engineering tools -- Keystroke logger---Is there one under your desk? -- One of my lunchtime tools -- Let's look at that telephone butt-in set on my tool belt -- Meet Mr. Phil Drake -- Meet Mr. Paul Henry -- Traditional AV, IDS, and IPS considerations -- Traditional firewall consideration -- Flaw remediation -- Do you have a guest user of your credit card? -- A few possible countermeasures -- Always be slightly suspicious -- Start to study the art of social engineering --
  • Contents note continued: Start a social engineering book library -- Summary -- ch. 2 Low tech vulnerabilities: Physical security -- A mini risk assessment -- What did I have at risk? -- What were some possible threats while out on the lake? -- What were some of the possible vulnerabilities? -- And finally, what about my countermeasures? -- Outsider---Insider threats -- Some things to consider for the security of your buildings? -- Check all locks for proper operation -- Use employee badges -- Shredder technology keeps changing as well -- Keep an eye on corporate or agency phone books -- Unsecured areas are targets for tailgating -- Special training for off-shift staff -- Bomb threats in Chicago -- Check those phone closets -- Remove a few door signs -- Review video security logs -- Consider adding motion-sensing lights -- Subterranean vulnerabilities -- Clean out your elephant burial ground -- Spot check those drop ceilings -- Internal auditors are your friends --
  • Contents note continued: Bonus: Home security tips -- Summary -- ch. 3 More about locks and ways to low tech hack them -- A little more about locks and lock picking -- What kinds of locks are the most popular? -- Purchasing better quality locks will be cost effective -- Be aware of lock vulnerabilities -- Forced entry---and other ways to cheat! -- A time-tested low tech method of forced entry -- Let's break into a semi-high security room -- Retracting the bolt to open the door -- Gaining access to the lock itself -- Keys and key control -- Social engineering and key access -- Who has the keys to your kingdom -- Special key control awareness training -- Bait and switch war story that could happen to you -- Padlock shims are not a new threat -- Some places to go to learn and have some fun -- My 110-year-old puzzle -- More about keys and how to make one if you don't have one -- Five pounds of my favorite keys -- Ways to make a key if you didn't bring a key machine --
  • Contents note continued: One final lock to talk about and then we're done -- Rim cylinder locks vs. mortise cylinder locks -- Summary -- ch. 4 Low tech wireless hacking -- Wireless 101: The electromagnetic spectrum -- Why securing wireless is hard -- 802.11 and Bluetooth low tech hacks -- DoS and availability -- Layer 1 DoS attacks -- Layer 2 DoS attacks -- Backdoors and cracks -- Crack attack -- Tap, tap. Mirror, mirror ... on the wallplate -- Guesssst who got in -- Peer-to-peer-to-hack -- Ad hoc, ad finem -- Going rogue -- Marveling at the gambit of rogues -- New SSID on the street -- It's a bird ... it's a plane ... it's a Rogue? -- Bridge bereavement -- Assault by defaults -- Open sesame -- Default WPA keys -- More Google hacking -- Bypassing specific security tools -- Going static -- Counterfeit MACs -- MAC switcharoo -- <html>Free Wi-Fi</html> -- Summary -- ch. 5 Low tech targeting and surveillance: How much could they find out about you? -- Initial identification --
  • Contents note continued: Property records, employment, and neighborhood routes -- Disclosure on social networks and social media -- Financials, investments, and purchase habits -- Frequented locations and travel patterns -- Third party disclosures -- Use of signatures -- Automated surveillance -- Target interaction -- Scanners and miniatures -- Summary and recommendations -- Recommendations -- ch. 6 Low tech hacking for the penetration tester -- The human condition -- Selective attention -- Magic is distraction -- Building trust and influencing behavior -- Technology matters -- USB thumb drives -- CDs and DVDs -- Staging the effort -- Target organization -- Getting things in order -- Deciding on location -- Choosing the strategy -- Choosing the technology -- A useful case study -- Approaching hotel staff -- Approaching conference staff -- Conclusion -- Summary -- ch. 7 Low tech hacking and the law: Where can you go for help? -- Meet Mr. Tony Marino --
  • Contents note continued: Low tech hacking interview with Tony Marino, U.S. Secret Service (retired) -- Meet Special Agent (SA) Gregory K. Baker, FBI -- Low tech hacking interview with Special Agent (SA) Gregory K. Baker, FBI -- Summary -- ch. 8 Information security awareness training: Your most valuable countermeasure to employee risk -- An introduction to information security awareness -- The people and personalities of information security awareness -- Data theft and employee awareness -- Designing an effective information security awareness program -- Repetition is the aide to memory -- Touch points -- To team or not to team, that is the question -- Creating a business plan for your Information Security Awareness Program -- The presentation -- Components of an awareness program -- Next steps -- The Classification of Data Matrix -- Manager's Quick Reference Guide -- Finding materials for your program -- The importance of a good editor --
  • Contents note continued: Implementing an information security awareness program -- Who writes the awareness standard? -- Finding win-win solutions -- Building a perpetual awareness program -- Who should take the training? -- Getting the program off the ground -- Making information security accessible -- A lesson learned -- The dollars and cents of your program -- Above and beyond -- Making security part of the company mind-set -- The importance of communication with other lines-of-businesses -- Let's talk more about alliances -- Keeping your program viable -- Other resources -- Measuring your program's success -- Identifying key components and cumulative results -- Summary
Control code
000048533835
Dimensions
23.5 cm.
Extent
xix, 243 p.
Isbn
9781597496650
Other physical details
ill.

Library Locations

    • Lionel Bowen Library and Community CentreBorrow it
      669-673 Anzac Parade, Marouba, NSW, 2035, AU
      -33.938111 151.237977
Processing Feedback ...