Deceived art (first chapter safe soft ribs)

xiaoxiao2021-04-09  454

Deception and terrorist

Of course, deception is not a special tool for social engineers. The terrorism of violence has made a sensational news event, and we have never been aware of the world we live full of danger. Civilization, finally is only a fragile sheet. In 2001, the 911 incident in New York was implanted in the hearts of sorrow and fear into everyone, not just Americans, and all kind people in the world. We have already begun, because this world is also distributed in good training extreme terrorists, waiting for our attacks again.

The recent strengthening efforts of the government have enhanced the security awareness of the public, and we need to stay alert and be wary of various forms of terrorism. We need to understand how terrorists make various identities, pretend to be in the crowd, and they have hidden their true thoughts to conspire horror, and they are using the deception technique similar to this book.

However, as I think that terrorists have not yet used social engineering techniques to penetrate into the infrastructure of water treatment plants, power plants, or other relations national mensive people's livelihood, but the possibility still exists, which is too easy to do. I want security awareness and corresponding security strategies will get the correct application and strengthen the upper management of the company, because this book is just right.

About this book

Corporate security is a balance problem, and the safety of the company is vulnerable, but too much emphasizes security will hinder business management and company development, and its difficulty is to achieve balance between production efficiency and safety.

Other books on corporate information security have focused on hard, software technology, and ignored the most important security threats - the deception of people. In contrast, the purpose of this book is to help you understand how you are, colleagues, and other people from the company have been manipulated, and help everyone build a barrier, beware of victims. This book focuses on the non-technical means of invaders to steal information, it can threaten the information integrity of the seemingly safe, and even destroy the company's work results.

My mission is more difficult because of a simple fact - each reader has been controlled by senior social engineering - their parents control, they have a way (such as: "This is for you") let you go Do what they think to be the most. Parents are the use of similar social engineering methods, ingeniously compiled a seemingly reasonable story, reasons, and excuses to achieve their goals. Yes, we are all guided by our parents - those who are happy (occasionally not completely) social engineers.

Due to this growth environment, it is easy to manipulate us. It is always a call to others, worried that it is very tired. In the ideal world we deal with others, everyone is honest and trustworthy. But we didn't live in the ideal world, we have to exercise our anti-fraud ability to deal with our enemies.

The main content of this book - the second and third part, telling the story of how social engineers implement deception. In these two parts, everyone will see the following:

· Telephone thieves have long found, a way to get a phone number from telephone company;

· Several different social engineering methods, can even make the staff and doubt staff to spit out their username and password;

· How does managers in the information center are controlled to steal the most secret product information of the enterprise in combination with attackers;

· How is the privacy investigator gets your company, you know the secret information, I can guarantee that this will make your ridge cool.

You may think that the stories described in these two areas actually can't happen, no one can use the lies in the book, the despicable method and the plan really achieve the purpose. In fact, in each case, these stories can become reality and have become a reality. These things happen every day in the world, and even when you read this book. The content in this book is not only enlightened on your business information, but also allows you to personally obstruct social engineers' attacks to protect your private information. In the fourth part of this book, I changed the direction. Here I want to help you build the necessary security strategies and safety awareness training to minimize the possibility of employees to be used by social engineers. Understand social engineers' strategy, methods and techniques, while helping you arrange reasonable control strategies while protecting your company's information assets.

In short, the purpose of I wrote this book is to enhance everyone's safety awareness to deal with serious threats from social engineers and help your company and company employees are not used as much as possible. Or I should say this, no longer used.

转载请注明原文地址:https://www.9cbs.com/read-133020.html

New Post(0)