Social Engineering Attack: Rethinking Responsibilities and Solutions | Agenda Bookshop Skip to content
Selected Colleen Hoover Books at €9.99c | In-store & Online
Selected Colleen Hoover Books at €9.99c | In-store & Online
A01=Gunikhan Sonowal
Age Group_Uncategorized
Age Group_Uncategorized
Author_Gunikhan Sonowal
automatic-update
Category1=Non-Fiction
Category=UR
COP=United States
Delivery_Delivery within 10-20 working days
Language_English
PA=Available
Price_€100 and above
PS=Active
softlaunch

Social Engineering Attack: Rethinking Responsibilities and Solutions

English

By (author): Gunikhan Sonowal

The social engineering attack is presented in the first chapter of the book. It covers the definition, background, motives, and outcome of the social engineering attack. The life cycle of a social engineering attack is covered in the second chapter of the book. Attack formulation, information collecting, preparation, cultivating relationships, exploitation, and debriefing are the six phrases used by social engineering attackers throughout the life cycle. The basic concepts of social engineering attacks are covered in the third chapter of the book. The six principles of social engineering include scarcity, commitment, authority, social proof, reciprocity, social proof, and social proof. Various forms of social engineering attacks are discussed in the fourth chapter of the book. The physical method, social approach, reverse social engineering approach, technical approach, and socio-technical approach are the five main forms of social engineering attacks. Identity theft is discussed in five of the book's chapters. The purpose of the information that attackers stole from users is explained in this chapter. Social engineering tools are covered in the book's six chapters. Organizations deploy a variety of toolkits to informally teach their staff members and identify organizational weaknesses. The seven chapter of the book covers the countermeasures for social engineering attacks. There are three ways to counter the social engineering attack includes policy and procedures, education, and technical. The eighth chapter of the book covers the laws that are related to social engineering attacks. Many governments proposed many laws which directly or indirectly related to social engineering attacks. The future of social engineering attacks is covered in the ninth chapter of the book. Some of the technology that will be utilized in the future for social engineering purposes is covered in this chapter. See more
Current price €176.69
Original price €185.99
Save 5%
A01=Gunikhan SonowalAge Group_UncategorizedAuthor_Gunikhan Sonowalautomatic-updateCategory1=Non-FictionCategory=URCOP=United StatesDelivery_Delivery within 10-20 working daysLanguage_EnglishPA=AvailablePrice_€100 and abovePS=Activesoftlaunch
Delivery/Collection within 10-20 working days
Product Details
  • Weight: 532g
  • Dimensions: 152 x 229mm
  • Publication Date: 10 May 2023
  • Publisher: Nova Science Publishers Inc
  • Publication City/Country: United States
  • Language: English
  • ISBN13: 9798886977394

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)
We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept