Low Tech Hacking
Street Smarts for Security Professionals
- 1st Edition - December 13, 2011
- Authors: Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Jack Wiles, Sean Lowther
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 6 6 5 - 0
- eBook ISBN:9 7 8 - 1 - 5 9 7 4 9 - 6 6 6 - 7
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporati… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteLow Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world.
Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk.
This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
- Contains insider knowledge of what could be your most likely Low Tech threat
- Includes timely advice from some of the top security minds in the world
- Covers many detailed countermeasures that you can employ to improve your security posture
Penetration Testers, Internal Auditors, Information Systems Auditors, CIOs, CISOs, Risk Managers, Fraud Investigators, System Administrators, Private Investigators, Ethical Hackers, Black Hat Hackers, Members of Local, State, and Federal Law Enforcement, Corporate Attorneys
Acknowledgments
Foreword
About the Authors
Introduction
Chapter 1. Social engineering
Chapter 2. Low tech vulnerabilities
Chapter 3. More about locks and ways to low tech hack them
Chapter 4. Low tech wireless hacking
Chapter 5. Low tech targeting and surveillance
Chapter 6. Low tech hacking for the penetration tester
Chapter 7. Low tech hacking and the law
Chapter 8. Information security awareness training
Index
- No. of pages: 264
- Language: English
- Edition: 1
- Published: December 13, 2011
- Imprint: Syngress
- Paperback ISBN: 9781597496650
- eBook ISBN: 9781597496667
TG
Terry Gudaitis
JJ
Jennifer Jabbusch
RR
Russ Rogers
JW
Jack Wiles
SL