The Art of Deception: Controlling the Human Element of Security

  • 6h 42m
  • Kevin D. Mitnick, William L. Simon
  • John Wiley & Sons (US)
  • 2002

Kevin Mitnick’s exploits as a cyber-desperado and fugitive from one of the most exhaustive FBI manhunts in history have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison in 2000, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world’s most famous hacker gives new meaning to the old adage, “It takes a thief to catch a thief.”

Most importantly, Mitnick redeems his former life of crime by providing specific guidelines for developing protocols, training programs, and manuals to ensure that a company’s sophisticated technical security investment will not be for naught. He shares his advice for preventing security vulnerability in the hope that people will be mindfully on guard for an attack from the gravest risk of all—human nature.

About the Author

Kevin D. Mitnick is a security consultant to corporations worldwide and a cofounder of Defensive Thinking, a Los Angeles-based consulting firm. He has testified before the Senate committee on Governmental Affairs on the need for legislation to ensure the security of the government’s information systems. His articles have appeared in major news magazines and trade journals and he has appeared on Court TV, Good Morning America, 60 Minutes, CNN’s Burden of Proof and Headline News, and has been a keynote speaker at numerous industry events. He has also hosted a weekly radio show in Los Angeles.

In this Book

  • Security's Weakest Link
  • When Innocuous Information Isn't
  • The Direct Attack: Just Asking for It
  • Building Trust
  • "Let Me Help You"
  • "Can You Help Me?"
  • Phony Sites and Dangerous Attachments
  • Using Sympathy, Guilt, and Intimidation
  • The Reverse Sting
  • Entering the Premises
  • Combining Technology and Social Engineering
  • Attacks on the Entry-Level Employee
  • Clever Cons
  • Industrial Espionage
  • Information Security Awareness and Training
  • Recommended Corporate Information Security Policies
  • Security at a Glance
  • Sources
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.6 of 174 users Rating 4.6 of 174 users (174)