Introduction
This book contains rich knowledge of information security and social engineering, in order to help read, the following is a brief introduction to this book:
In the first part of this book (Chapter 1), I will display the weak link of information security and point out why you and your business are in danger of social engineers attack.
The second part of this book (second to nine chapters), you will see how social engineers use people's trust, the wish and sympathetic heart make you wanted to be deceived, so that they want. This book describes a typical attack case through the form of a novel story, and demonstrates social engineers to wear many masks and pretend to be various identities. If you think you have never met this kind of thing, you are likely to be wrong. Can you recognize what you have learned from this book? Do you want to know if you have experienced social engineering attacks? These are very likely. But when you read the second chapter to the ninth chapter, you know how you take the initiative when you call the next social engineer.
The next section will showcase how social engineers are jealous, enter the process of entering the enterprise, stealing health information and crossing advanced security prevention and control measures. This part of this part will make people realize that the security threat is in all aspects, from ordinary employees' retaliation from the company to the network terrorism of computer space. If you attach importance to the data and secret information that keep the company's business operation, please read the third part of this book (tenth to Chapter 14). It needs to be indicated here: "Unless otherwise stated, the storyline in this book is purely fictitious."
The fourth part of this book (Chapter 15-16) I will talk about how to success in the business dialogue to prevent social engineering to bring attacks to enterprises. Chapter 15 provides a set of effective safety precaution training programs; the sixteenth chapter may get your urgent needs - it contains a complete security policy, you can apply immediately according to the needs of the company to ensure the information security of the company.
Finally, this book provides a "security", which is a list of lists, which is used to overview some health information to help employees prevent attacks from social engineering in their work. These methods can also provide you with your own information security training program to provide a quite help.
Overview, you can also find some very useful content entry: "Tet box" provides the term social engineering and computer hackers; "Mitnick Letterbox" sends a classic phrase to help deepen the impression of safety strategies; The toolbar brings additional information such as interesting background knowledge.