Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Art of Social Engineering
  • Table Of Contents Toc
  • Feedback & Rating feedback
The Art of Social Engineering

The Art of Social Engineering

By : Cesar Bravo, Desilda Toska
4.9 (9)
close
close
The Art of Social Engineering

The Art of Social Engineering

4.9 (9)
By: Cesar Bravo, Desilda Toska

Overview of this book

Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them. The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.
Table of Contents (17 chapters)
close
close
1
Part 1: Understanding Social Engineering
6
Part 2: Enhanced Social Engineering Attacks
11
Part 3: Protecting against Social Engineering Attacks

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

account hijacking 112

account suspension scam 58

Ace Ventura scam 45

advance-fee fraud 38

adware attack 98

preventing, considerations 99

AI-assisted social media manipulation attacks 140, 141

algorithmic exploitation 141

automated content generation 141

bot networks 141

influencer impersonation 141

micro-targeting 141

protecting against 142

AI-driven social engineering techniques 125

deepfake technology 125

natural language processing (NLP) 125

voice cloning 125

AI-enhanced social engineering attacks

protecting against 127, 128

strategies, for combating 125-130

AI-powered phishing attacks 137, 138

advanced social engineering 138

AI-enhanced impersonation 138

automated spear phishing 138

protecting against 139, 140

real...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY