HjemGrupperSnakMereZeitgeist
Søg På Websted
På dette site bruger vi cookies til at levere vores ydelser, forbedre performance, til analyseformål, og (hvis brugeren ikke er logget ind) til reklamer. Ved at bruge LibraryThing anerkender du at have læst og forstået vores vilkår og betingelser inklusive vores politik for håndtering af brugeroplysninger. Din brug af dette site og dets ydelser er underlagt disse vilkår og betingelser.

Resultater fra Google Bøger

Klik på en miniature for at gå til Google Books

The art of deception : controlling the human…
Indlæser...

The art of deception : controlling the human element of security (udgave 2002)

af Kevin D. Mitnick

MedlemmerAnmeldelserPopularitetGennemsnitlig vurderingOmtaler
1,6291610,826 (3.5)3
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.… (mere)
Medlem:wayman
Titel:The art of deception : controlling the human element of security
Forfattere:Kevin D. Mitnick
Info:Indianapolis, Ind. : Wiley, c2002.
Samlinger:Dit bibliotek
Vurdering:
Nøgleord:Ingen

Work Information

The Art of Deception: Controlling the Human Element of Security af Kevin D. Mitnick

Indlæser...

Bliv medlem af LibraryThing for at finde ud af, om du vil kunne lide denne bog.

Der er ingen diskussionstråde på Snak om denne bog.

» Se også 3 omtaler

Engelsk (15)  Fransk (1)  Alle sprog (16)
Viser 1-5 af 16 (næste | vis alle)
This book remains extremely relevant to system security problems. Kevin Mitnick, one of the most effective hackers in the end of 20th century describes simple examples that tear at the seems of organised corporate culture security. Really, everyone should have a read to get a sense of how systems can suffer huge damaging impact despite them being carefully certified, monitored and updated. Psychology can have more impact that technology. ( )
  yates9 | Feb 28, 2024 |
Me crucé con este libro (está en la mula, por supuesto) y me lo he devorado en dos días. Hay una segunda parte, The Art of Intrusion, que parece que está incluso mejor.
Kevin Mitnick se hizo bastante famoso, para su desgracia, cuando le condenaron a unos cuantos años de cárcel por diversos delitos contra la seguridad electrónica de varias empresas y agencias estatales norteamericanas (nada grave según él, el holocausto informático según el fiscal). La Wikipedia (Kevin Mitnick, Kevin Mitnick ) cuenta su historia por encima. El caso es que él está convencido de que le tomaron como cabeza de turco, tanto los periodistas como el sistema judicial.
Este libro no es una biografía, sino un repaso a los métodos de lo que se ha dado en llamar “ingeniería social”, o el arte de sonsacar información importante a la gente que la tiene sin que estos se alarmen. El libro consiste en un montón de casos (supuestamente verídicos) en los que una persona ajena a cualquier empresa u organización acaba por obtener gran cantidad de información. Kevin Mitnick [KM] habla de detectives privados, de estudiantes de instituto con mucho tiempo libre e incluso de una nueva figura, en el borde de la legalidad, llamada “brokers de información”, especialistas todos ellos en encontrar información que supuestamente no debe ser divulgada al público.
Los casos son realmente entretenidos de leer. Muchas de las veces uno piensa “no, eso no me podría pasar a mí”, pero eso justo es lo que dice KM que piensa todo el mundo. Y sin embargo pasa constantemente, según él. En cada caso que relata termina instruyendo acerca de cómo algunas políticas de difusión de información dentro de la empresa, bien instauradas, podrían evitar la gran mayoría, si no todos, los escapes de información debidos a ataques mediante ingeniería social.
El último capítulo es algo más soso y se dedica íntegramente a resumir de manera estructurada todos los pasos que cualquier organización, ya sea privada o gubernamental, debería dar para establecer políticas claras e inatacables que minimicen el flujo de información importante al exterior.
El libro es muy entretenido y se lee rápidamente. Deja (al menos a mí) con muchas ganas de seguir leyendo sobre el tema, por lo que rápidamente “localicé” el siguiente libro del mismo autor, que ya ando devorando. Mi nota: Muy interesante. ( )
  Remocpi | Apr 22, 2020 |
Maybe the best book on social engineering I've ever read (also pretty much the only one). I don't have a ton to say here other than I'd only recommend this book if you are interested in cybersecurity. It might be a nice educational book for your older family members to teach them about the dangers of Phishing/Scam phone calls, perhaps? ( )
  bhiggs | Apr 7, 2020 |
"Très bon ouvrage. Quelques fautes de style cependant. Mais... ce n'est pas vraiment ce qu'on lui demande ! ;-)
Je suis étonné de constater que chacun veuille utiliser ce livre à des fins malveillantes alors que Mitnick l'a fait pour gagner de l'argent et pour prouver combien il était facile de voler des information et que la plupart des gens n'appréhe,de même pas que l'on puise les berner à longueur de temps. Je trouve que ce bouquin est un excellent avertissement sur les dangers de la crédulité et sur la nécessité de savoir et veiller à protéger efficacement nos informations." Anonyme

"Rien à dire. Avant de poster des commentaires, regarder dans le dictionnaire la désignation du mot "hacker". Vous éviterais ainsi "d'insulter" un homme comme lui ! Merci d'avance." Anonyme

"Un best-seller. Ce livre est un bijoux du genre et quel génie ! Le livre est hyper intéressant avec des scénarios hypers passionnants et captivants. Je ne lis que très rarement mais celui-ci est mon livre de chevet !" Anonyme

"Très bon ouvrage. Quelques fautes de style cependant. Mais... ce n'est pas vraiment ce qu'on lui demande ! ;-)
Je suis étonné de constater que chacun veuille utiliser ce livre à des fins malveillantes alors que Mitnick l'a fait pour gagner de l'argent et pour prouver combien il était facile de voler des information et que la plupart des gens n'appréhe,de même pas que l'on puise les berner à longueur de temps. Je trouve que ce bouquin est un excellent avertissement sur les dangers de la crédulité et sur la nécessité de savoir et veiller à protéger efficacement nos informations." Anonyme
  Gaudard | May 15, 2013 |
Viser 1-5 af 16 (næste | vis alle)
ingen anmeldelser | tilføj en anmeldelse

Belongs to Series

Tilhører Forlagsserien

Du bliver nødt til at logge ind for at redigere data i Almen Viden.
For mere hjælp se Almen Viden hjælpesiden.
Kanonisk titel
Originaltitel
Alternative titler
Oprindelig udgivelsesdato
Personer/Figurer
Vigtige steder
Vigtige begivenheder
Beslægtede film
Indskrift
Tilegnelse
Oplysninger fra den engelske Almen Viden Redigér teksten, så den bliver dansk.
For Shelly Jaffe, Reba Vartanian, Chickie Leventhal, and Mithcell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello

For Arynne, Victoria, and David, Sheldon, Vincent, and Elena
Første ord
Oplysninger fra den engelske Almen Viden Redigér teksten, så den bliver dansk.
A company may have purchased the best security technologies that money can buy, trained their people so well that they lock up all their secrets before going home at night, and hired building guards from the best security firm in the business.
Citater
Sidste ord
Oplysninger fra den engelske Almen Viden Redigér teksten, så den bliver dansk.
(Klik for at vise Advarsel: Kan indeholde afsløringer.)
Oplysning om flertydighed
Forlagets redaktører
Bagsidecitater
Originalsprog
Canonical DDC/MDS
Canonical LCC

Henvisninger til dette værk andre steder.

Wikipedia på engelsk (3)

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

No library descriptions found.

Beskrivelse af bogen
Haiku-resume

Current Discussions

Ingen

Populære omslag

Quick Links

Vurdering

Gennemsnit: (3.5)
0.5 3
1 6
1.5 2
2 23
2.5 3
3 85
3.5 15
4 91
4.5
5 41

Er det dig?

Bliv LibraryThing-forfatter.

 

Om | Kontakt | LibraryThing.com | Brugerbetingelser/Håndtering af brugeroplysninger | Hjælp/FAQs | Blog | Butik | APIs | TinyCat | Efterladte biblioteker | Tidlige Anmeldere | Almen Viden | 204,493,009 bøger! | Topbjælke: Altid synlig