Skip to main content


Social Engineering And Awareness Training


The rapid growth of strong technological control measures used to protect information technologies has forced attackers into exploiting creative ways to fulfill their purpose. The creative attacks are centered on the not so technological aspects of information technology, which are “humans”, often called the weakest link. Network users are being targeted to provide essential information, which would ease a technical attack. In the information security field, social engineering is defined as: “an attack in which an attacker uses human interaction to obtain or compromise information about an organization or its computer system.”


“On Wednesday, a man dressed as an armored truck employee with the company AT Systems walked into a BB&T bank in Wheaton about 11 a.m., was handed more than $500,000 in cash and walked out, a source familiar with the case said.

It wasn't until the actual AT Systems employees arrived at the bank, at 11501 Georgia Ave the next day, that bank officials realized they'd been had”.

It is very probable that bank had many security controls like: metal detectors, security cameras, security officer, and man trap doors among others.

None of these technical controls stopped the thief from stealing five hundred thousand dollars from the bank like if nothing ever happened.

The art of deception can be found in many ways and thanks to the human response most of the social engineering skills are very successful.

Kevin Mitnick tells the story that goes back to 1978 about a man called Mark Rifkin, “... pulled the biggest bank heist in history- and done it without using a gun, even without a computer".

One would think that living in the information age, organizations would be more aware of such old methods to compromise an information system. It has been proven that as time progresses, the human factor still remains the weakest link in organizations.


File Type: PDF
File Size: 2.29 MB

Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now

Comments

Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

Android Things Quick Start Guide

Android Things is the new Android based Operating System for the Internet of Things. With this book you will learn the core concepts by running code examples on different peripherals. Android Things is the IoT platform made by Google, based on Android. It allows us to build smart devices in a simple and convenient way, leveraging on the Android ecosystem tools and libraries, while letting Google take care of security updates.

Programming QuickStart Box Set

This tutorial on HTML is designed specifically for aspiring developers and web designers. This tutorial is explained in enough detail with practical examples and a simple overview so that it can be easily understood by beginners and provides enough knowledge to design their own webpages. You can get a higher level of expertise with some practice.  HTML or Hyper Text Markup Language is the most commonly used language for developing web pages.