Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]
Resource Information
The instance Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.] represents a material embodiment of a distinct intellectual or artistic creation found in Randwick City Library.
The Resource
Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]
Resource Information
The instance Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.] represents a material embodiment of a distinct intellectual or artistic creation found in Randwick City Library.
- Label
- Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]
- Title remainder
- street smarts for security professionals
- Statement of responsibility
- Jack Wiles ... [et al.]
- Note
- Includes index
- Bibliography note
- Includes bibliographical references and index
- Contents
-
- Machine generated contents note: ch. 1 Social engineering: The ultimate low tech hacking threat -- How easy is it? -- The mind of a social engineer -- The mind of a victim -- Tools of the social engineering trade -- One of my favorite tools of the trade -- Social engineering would never work against our company -- What was I able to social engineer out of Mary? -- The final sting---two weeks later---Friday afternoon -- Why did this scam work? -- Let's look at a few more social engineering tools -- Keystroke logger---Is there one under your desk? -- One of my lunchtime tools -- Let's look at that telephone butt-in set on my tool belt -- Meet Mr. Phil Drake -- Meet Mr. Paul Henry -- Traditional AV, IDS, and IPS considerations -- Traditional firewall consideration -- Flaw remediation -- Do you have a guest user of your credit card? -- A few possible countermeasures -- Always be slightly suspicious -- Start to study the art of social engineering --
- Contents note continued: Start a social engineering book library -- Summary -- ch. 2 Low tech vulnerabilities: Physical security -- A mini risk assessment -- What did I have at risk? -- What were some possible threats while out on the lake? -- What were some of the possible vulnerabilities? -- And finally, what about my countermeasures? -- Outsider---Insider threats -- Some things to consider for the security of your buildings? -- Check all locks for proper operation -- Use employee badges -- Shredder technology keeps changing as well -- Keep an eye on corporate or agency phone books -- Unsecured areas are targets for tailgating -- Special training for off-shift staff -- Bomb threats in Chicago -- Check those phone closets -- Remove a few door signs -- Review video security logs -- Consider adding motion-sensing lights -- Subterranean vulnerabilities -- Clean out your elephant burial ground -- Spot check those drop ceilings -- Internal auditors are your friends --
- Contents note continued: Bonus: Home security tips -- Summary -- ch. 3 More about locks and ways to low tech hack them -- A little more about locks and lock picking -- What kinds of locks are the most popular? -- Purchasing better quality locks will be cost effective -- Be aware of lock vulnerabilities -- Forced entry---and other ways to cheat! -- A time-tested low tech method of forced entry -- Let's break into a semi-high security room -- Retracting the bolt to open the door -- Gaining access to the lock itself -- Keys and key control -- Social engineering and key access -- Who has the keys to your kingdom -- Special key control awareness training -- Bait and switch war story that could happen to you -- Padlock shims are not a new threat -- Some places to go to learn and have some fun -- My 110-year-old puzzle -- More about keys and how to make one if you don't have one -- Five pounds of my favorite keys -- Ways to make a key if you didn't bring a key machine --
- Contents note continued: One final lock to talk about and then we're done -- Rim cylinder locks vs. mortise cylinder locks -- Summary -- ch. 4 Low tech wireless hacking -- Wireless 101: The electromagnetic spectrum -- Why securing wireless is hard -- 802.11 and Bluetooth low tech hacks -- DoS and availability -- Layer 1 DoS attacks -- Layer 2 DoS attacks -- Backdoors and cracks -- Crack attack -- Tap, tap. Mirror, mirror ... on the wallplate -- Guesssst who got in -- Peer-to-peer-to-hack -- Ad hoc, ad finem -- Going rogue -- Marveling at the gambit of rogues -- New SSID on the street -- It's a bird ... it's a plane ... it's a Rogue? -- Bridge bereavement -- Assault by defaults -- Open sesame -- Default WPA keys -- More Google hacking -- Bypassing specific security tools -- Going static -- Counterfeit MACs -- MAC switcharoo -- <html>Free Wi-Fi</html> -- Summary -- ch. 5 Low tech targeting and surveillance: How much could they find out about you? -- Initial identification --
- Contents note continued: Property records, employment, and neighborhood routes -- Disclosure on social networks and social media -- Financials, investments, and purchase habits -- Frequented locations and travel patterns -- Third party disclosures -- Use of signatures -- Automated surveillance -- Target interaction -- Scanners and miniatures -- Summary and recommendations -- Recommendations -- ch. 6 Low tech hacking for the penetration tester -- The human condition -- Selective attention -- Magic is distraction -- Building trust and influencing behavior -- Technology matters -- USB thumb drives -- CDs and DVDs -- Staging the effort -- Target organization -- Getting things in order -- Deciding on location -- Choosing the strategy -- Choosing the technology -- A useful case study -- Approaching hotel staff -- Approaching conference staff -- Conclusion -- Summary -- ch. 7 Low tech hacking and the law: Where can you go for help? -- Meet Mr. Tony Marino --
- Contents note continued: Low tech hacking interview with Tony Marino, U.S. Secret Service (retired) -- Meet Special Agent (SA) Gregory K. Baker, FBI -- Low tech hacking interview with Special Agent (SA) Gregory K. Baker, FBI -- Summary -- ch. 8 Information security awareness training: Your most valuable countermeasure to employee risk -- An introduction to information security awareness -- The people and personalities of information security awareness -- Data theft and employee awareness -- Designing an effective information security awareness program -- Repetition is the aide to memory -- Touch points -- To team or not to team, that is the question -- Creating a business plan for your Information Security Awareness Program -- The presentation -- Components of an awareness program -- Next steps -- The Classification of Data Matrix -- Manager's Quick Reference Guide -- Finding materials for your program -- The importance of a good editor --
- Contents note continued: Implementing an information security awareness program -- Who writes the awareness standard? -- Finding win-win solutions -- Building a perpetual awareness program -- Who should take the training? -- Getting the program off the ground -- Making information security accessible -- A lesson learned -- The dollars and cents of your program -- Above and beyond -- Making security part of the company mind-set -- The importance of communication with other lines-of-businesses -- Let's talk more about alliances -- Keeping your program viable -- Other resources -- Measuring your program's success -- Identifying key components and cumulative results -- Summary
- Control code
- 000048533835
- Dimensions
- 23.5 cm.
- Extent
- xix, 243 p.
- Isbn
- 9781597496650
- Other physical details
- ill.
- Record ID
- u117790
Context
Context of Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.randwick.nsw.gov.au/resource/Ms1u51bmY6Y/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.randwick.nsw.gov.au/resource/Ms1u51bmY6Y/">Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.randwick.nsw.gov.au/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.randwick.nsw.gov.au/">Randwick City Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.randwick.nsw.gov.au/resource/Ms1u51bmY6Y/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.randwick.nsw.gov.au/resource/Ms1u51bmY6Y/">Low tech hacking : street smarts for security professionals, Jack Wiles ... [et al.]</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.randwick.nsw.gov.au/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.randwick.nsw.gov.au/">Randwick City Library</a></span></span></span></span></div>