Social engineering: hacking systems, nations, and societies
This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL
CRC Press
[2020]
|
Schlagworte: | |
Online-Zugang: | FWS01 FWS02 TUM01 UBY01 |
Zusammenfassung: | This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, youll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security. |
Beschreibung: | 1 Online-Ressource (IX, 245 Seiten) |
ISBN: | 9781000398281 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046299681 | ||
003 | DE-604 | ||
005 | 20230728 | ||
007 | cr|uuu---uuuuu | ||
008 | 191211s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781000398281 |c Online |9 978-1-00-039828-1 | ||
035 | |a (ELiSA)ELiSA-9780367313371 | ||
035 | |a (OCoLC)1135420411 | ||
035 | |a (DE-599)BVBBV046299681 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91 |a DE-863 |a DE-862 | ||
084 | |a DAT 055 |2 stub | ||
100 | 1 | |a Erbschloe, Michael |d 1951- |e Verfasser |0 (DE-588)1140140027 |4 aut | |
245 | 1 | 0 | |a Social engineering |b hacking systems, nations, and societies |
264 | 1 | |a Boca Raton, FL |b CRC Press |c [2020] | |
300 | |a 1 Online-Ressource (IX, 245 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a 1. Introduction to Social Engineering Use by Bad Guys. 2. The Continuum of Social Engineering Approaches. 3. Criminal Social Engineering Activities. 4. Securing Organizations against Social Engineering Attacks. 5. Social Engineering Attacks Leveraging PII. 6. Hacking the Democratic Electoral Process. 7. Socially Engineered Attacks by Insiders. 8. Educating People to Prevent Social Engineering Attacks. 9. The Accent of Cyber Darkness. Glossary. | |
520 | 3 | |a This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, youll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security. | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sozialtechnologie |0 (DE-588)4181997-4 |2 gnd |9 rswk-swf |
653 | |a Soziale und ethische Aspekte der EDV | ||
653 | |a Computersicherheit | ||
653 | |a Netzwerksicherheit | ||
653 | |a Technische Zuverlässigkeit, Sicherheitstechnik | ||
689 | 0 | 0 | |a Sozialtechnologie |0 (DE-588)4181997-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-429-32214-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-367-31337-1 |
912 | |a ZDB-30-PQE |a ZDB-7-TFC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031677033 | ||
966 | e | |u https://doi.org/10.1201/9780429322143 |l FWS01 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9780429322143 |l FWS02 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=5890629 |l TUM01 |p ZDB-30-PQE |q TUM_PDA_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/unibwm/detail.action?docID=5890629 |l UBY01 |p ZDB-30-PQE |q UBY01_Einzelkauf19 |x Aggregator |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1035181 |
---|---|
_version_ | 1824553677743980545 |
any_adam_object | |
author | Erbschloe, Michael 1951- |
author_GND | (DE-588)1140140027 |
author_facet | Erbschloe, Michael 1951- |
author_role | aut |
author_sort | Erbschloe, Michael 1951- |
author_variant | m e me |
building | Verbundindex |
bvnumber | BV046299681 |
classification_tum | DAT 055 |
collection | ZDB-30-PQE ZDB-7-TFC |
contents | 1. Introduction to Social Engineering Use by Bad Guys. 2. The Continuum of Social Engineering Approaches. 3. Criminal Social Engineering Activities. 4. Securing Organizations against Social Engineering Attacks. 5. Social Engineering Attacks Leveraging PII. 6. Hacking the Democratic Electoral Process. 7. Socially Engineered Attacks by Insiders. 8. Educating People to Prevent Social Engineering Attacks. 9. The Accent of Cyber Darkness. Glossary. |
ctrlnum | (ELiSA)ELiSA-9780367313371 (OCoLC)1135420411 (DE-599)BVBBV046299681 |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03163nmm a2200493 c 4500</leader><controlfield tag="001">BV046299681</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230728 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191211s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000398281</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-00-039828-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELiSA)ELiSA-9780367313371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1135420411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046299681</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Erbschloe, Michael</subfield><subfield code="d">1951-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1140140027</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social engineering</subfield><subfield code="b">hacking systems, nations, and societies</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (IX, 245 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Introduction to Social Engineering Use by Bad Guys. 2. The Continuum of Social Engineering Approaches. 3. Criminal Social Engineering Activities. 4. Securing Organizations against Social Engineering Attacks. 5. Social Engineering Attacks Leveraging PII. 6. Hacking the Democratic Electoral Process. 7. Socially Engineered Attacks by Insiders. 8. Educating People to Prevent Social Engineering Attacks. 9. The Accent of Cyber Darkness. Glossary.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, youll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sozialtechnologie</subfield><subfield code="0">(DE-588)4181997-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Soziale und ethische Aspekte der EDV</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computersicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Netzwerksicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Technische Zuverlässigkeit, Sicherheitstechnik</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sozialtechnologie</subfield><subfield code="0">(DE-588)4181997-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-429-32214-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-367-31337-1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031677033</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9780429322143</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9780429322143</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=5890629</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_PDA_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/unibwm/detail.action?docID=5890629</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">UBY01_Einzelkauf19</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046299681 |
illustrated | Not Illustrated |
indexdate | 2025-02-20T06:39:41Z |
institution | BVB |
isbn | 9781000398281 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031677033 |
oclc_num | 1135420411 |
open_access_boolean | |
owner | DE-706 DE-91 DE-BY-TUM DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-706 DE-91 DE-BY-TUM DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (IX, 245 Seiten) |
psigel | ZDB-30-PQE ZDB-7-TFC ZDB-30-PQE TUM_PDA_PQE_Kauf ZDB-30-PQE UBY01_Einzelkauf19 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | CRC Press |
record_format | marc |
spellingShingle | Erbschloe, Michael 1951- Social engineering hacking systems, nations, and societies 1. Introduction to Social Engineering Use by Bad Guys. 2. The Continuum of Social Engineering Approaches. 3. Criminal Social Engineering Activities. 4. Securing Organizations against Social Engineering Attacks. 5. Social Engineering Attacks Leveraging PII. 6. Hacking the Democratic Electoral Process. 7. Socially Engineered Attacks by Insiders. 8. Educating People to Prevent Social Engineering Attacks. 9. The Accent of Cyber Darkness. Glossary. Computersicherheit (DE-588)4274324-2 gnd Sozialtechnologie (DE-588)4181997-4 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4181997-4 |
title | Social engineering hacking systems, nations, and societies |
title_auth | Social engineering hacking systems, nations, and societies |
title_exact_search | Social engineering hacking systems, nations, and societies |
title_full | Social engineering hacking systems, nations, and societies |
title_fullStr | Social engineering hacking systems, nations, and societies |
title_full_unstemmed | Social engineering hacking systems, nations, and societies |
title_short | Social engineering |
title_sort | social engineering hacking systems nations and societies |
title_sub | hacking systems, nations, and societies |
topic | Computersicherheit (DE-588)4274324-2 gnd Sozialtechnologie (DE-588)4181997-4 gnd |
topic_facet | Computersicherheit Sozialtechnologie |
work_keys_str_mv | AT erbschloemichael socialengineeringhackingsystemsnationsandsocieties |