Social Engineering-Hacking Systems, Nations, and Societies 1st Edition by Michael Erbschloe – Ebook PDF Instant Download/DeliveryISBN: 1000439120, 9781000439120
Full download Social Engineering-Hacking Systems, Nations, and Societies 1st Edition after payment.
Product details:
ISBN-10 : 1000439120
ISBN-13 : 9781000439120
Author: Michael Erbschloe
This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, you’ll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security.
Social Engineering-Hacking Systems, Nations, and Societies 1st Table of contents:
Chapter 1 Introduction to Social Engineering Use by Bad Guys
1.1 Understanding the Breadth of Social Engineering as a Weapon
1.2 Social Engineering Fraud Schemes
1.3 The Cyber Underground
1.4 FBI and Strategic Partnerships
1.5 The Basic Steps to Countering Phishing Attacks
1.6 A New Level of Social Engineering for the 21st Century
1.7 The Organization of this Book
1.8 Conclusion
1.9 Key Points
1.10 Seminar Discussion Topics
1.11 Seminar Group Project
Key Terms
References
Chapter 2 The Continuum of Social Engineering Approaches
2.1 What Social Engineering Attackers Want
2.2 Common Types of Fraud
2.3 Socially Engineered Larger-Scale Investment Scams
2.4 Ways Social Engineering Attackers Work
2.5 Conclusion
2.6 Key Points
2.7 Seminar Discussion Topics
2.8 Seminar Group Project
Key Terms
References
Chapter 3 Criminal Social Engineering Activities
3.1 The Tech Support Scam
3.2 Business Email Compromise
3.3 Social Engineering of Education Scams
3.4 The Avalanche Takedown
3.5 Takedown of the Gameover Zeus and Cryptolocker Operations
3.6 Social Engineers are Striking on Numerous Fronts
3.7 The North Korean Connection
3.8 Conclusion
3.9 Key Points
3.10 Seminar Discussion Topics
3.11 Seminar Group Project
Key Terms
References
Chapter 4 Securing Organizations Against Social Engineering Attacks
4.1 The Basics of Security for Social Engineering Attacks
4.2 Applying the Cybersecurity Framework is an Ongoing Process
4.3 The Framework Components
4.4 Developing Security Policies
4.5 Protecting Small Businesses from Social Engineering Attacks
4.6 Establishing a Culture of Security
4.7 Conclusion
4.8 Key Points
4.9 Seminar Discussion Topics
4.10 Seminar Group Project
Key Terms
References
Chapter 5 Social Engineering Attacks Leveraging PII
5.1 Defining Personally Identifiable Information (PII)
5.2 Why PII is a Problem
5.3 Identity Theft is Made Easy with PII
5.4 Self Disclosure of PII is also a Problem
5.5 The Harassment of Doxxing
5.6 Pending Congressional Legislation Addressing Doxxing
5.7 Real Examples of Doxxing and Cyberbullying
5.8 Conclusion
5.9 Key Points
5.10 Seminar Discussion Topics
5.11 Seminar Group Project
Key Terms
References
Chapter 6 Hacking the Democratic Electoral Process
6.1 How Active Measures Have Progressed Over Time
6.2 Social Engineering Patterns in Politics
6.3 Social Engineering Political Messages
6.4 Social Engineering People
6.5 Department of Justice Actions Against Social Engineers
6.6 Conclusion
6.7 Key Points
6.8 Seminar Discussion Topics
6.9 Seminar Group Issue
Key Terms
References
Chapter 7 Socially Engineered Attacks by Insiders
7.1 The Nature of the Insider Threat
7.2 National Security and Social Engineering Threats
7.3 The National Insider Threat Task Force
7.4 Social Engineering Attacks on Businesses
7.5 Basic Steps to Protect Against Insider Threats
7.6 Conclusion
7.7 Key Points
7.8 Seminar Discussion Topics
7.9 Seminar Group Project
Key Terms
References
Chapter 8 Educating People to Prevent Social Engineering Attacks
8.1 Social Engineering Attacks Come in Many Shapes and Sizes
8.2 The Diversity in Electoral Populations that Need Education
8.3 Neutralizing Click Bait by Educating Internet Users
8.4 Rethinking How to Package the Social Engineering Prevention Message
8.5 Preventing Radicalization of Individuals
8.6 FBI Kids
8.7 Conclusion
8.8 Key Points
8.9 Seminar Discussion Topics
8.10 Seminar Group Project
Key Terms
References
Chapter 9 The Ascent of Cyber Darkness
9.1 The Evolution of Cyber Threats and Vulnerabilities
9.2 Nationwide Cybercrime Sweeps are Impressive but not Enough
9.3 The Man Who Knew About Social Engineering and Fraud
9.4 Law Enforcement Training on Cybercrimes
9.5 Conclusions
9.6 Key Points
9.7 Seminar Discussion Topics
9.8 Seminar Group Project
People also search for Social Engineering-Hacking Systems, Nations, and Societies 1st:
what are the three hacks in social engineering
3 examples of social engineering attacks
3 types of social engineering attacks
4 phases of social engineering attacks
5 most common social engineering attacks
Tags: Social Engineering, Hacking Systems, Nations, Societies, Michael Erbschloe