Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learn Social Engineering

You're reading from   Learn Social Engineering Learn the art of human hacking with an internationally renowned expert

Arrow left icon
Product type Paperback
Published in Apr 2018
Publisher
ISBN-13 9781788837927
Length 566 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Dr. Erdal Ozkaya Dr. Erdal Ozkaya
Author Profile Icon Dr. Erdal Ozkaya
Dr. Erdal Ozkaya
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Introduction to Social Engineering FREE CHAPTER 2. The Psychology of Social Engineering – Mind Tricks Used 3. Influence and Persuasion 4. Information Gathering 5. Targeting and Recon 6. Elicitation 7. Pretexting 8. Social Engineering Tools 9. Prevention and Mitigation 10. Case Studies of Social Engineering 11. Ask the Experts – Part 1 12. Ask the Experts – Part 2 13. Ask the Experts – Part 3 14. Ask the Experts – Part 4 15. Other Books You May Enjoy

Introduction to Social Engineering

In any battle, there is no better knowledge than knowing about the enemy's tactics. This chapter will introduce you to the world of social engineering and look at what social engineering is all about. Social engineering is a set of techniques that are widely being used in cyberattacks to orchestrate some of the most successful attacks. Social engineering uniquely targets a weak component in the cybersecurity chain—the user. Unlike systems and networks, users cannot be protected from social engineering by means of expensive tools, such as firewalls and antivirus programs. They are always in the open and they are always giving out information that can be used by attackers to hit them when least expected. People also have the higher return on investment compared to systems. Within an hour, a social engineering expert can make away with as much information as it would have taken him or her 100 hours to gather trying to attack a protected system directly. Attackers are aware of the current sophistication of the security elements that protect systems. Most organizations use multiple layers of security. Even if one is compromised, the hacker cannot get past the others easily. It has, therefore, become harder to try to attack the systems themselves. At the same time, hackers are discovering that it is easy to hack today's users and this has been confirmed by the rising number of mediated social engineering attacks. This chapter will give an overview of social engineering. It will cover the following topics:

  • Elicitation
  • Pretexting
  • Mind tricks
  • Persuasion
  • Tools used in social engineering
You have been reading a chapter from
Learn Social Engineering
Published in: Apr 2018
Publisher:
ISBN-13: 9781788837927
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image