Stickley, J: Corporate Insecurity
Autor Jim Stickleyen Limba Engleză Paperback – 29 feb 2020
Preț: 136.98 lei
Nou
26.22€ • 26.97$ • 21.75£
Carte indisponibilă temporar
Specificații
ISBN-10: 0789739879
Pagini: 320
Dimensiuni: 178 x 232 mm
Ediția:1
Editura: Pearson Education (US)
Locul publicării:Indianapolis, United States
Notă biografică
JimStickley,CTOandVPofEngineeringforTraceSecurity,isaninternationallyrenownedsecurityexpert.HedirectsTraceSecurity'scompanystrategy.StickleyhasbeenshowcasedonNBCNightlyNews,CNNNewsNight,CNBC'sandNBC'sTodayShow,andquotedinTime,BusinessWeek,Fortune,andTheNewYorkTimesamongstothers.HeisauthorofTheTruthAboutIdentityTheft.
Descriere
A shocking tell-all look at corporate security, from a white-hat hacker who's spent years breaking into banks, insurers, and hospitals! If you assume that the businesses you deal with are looking after your data securely, you're in for a shock. Companies are only as secure as their weakest link - this book shows just how weak this link can be. Corporate Insecurity details frightening tales of corporate espionage that have never been told before.
It includes from-the-trenches advice on making safe security holes: from technical issues to training, physical layouts to security mindsets. Written by Jim Stickley, one of the world's most well-known experts on corporate security and identity theft.
Cuprins
PartI:BreakinginWhileTheyWatch
1.TheFireInspectoratabank
2.TheRussianDiplomatatagovernmentfacility
3.ThePestInspectoratacreditunion
4.TheAirConditioningTechnicianattheLottery
5.TheCubeConsultantatamortgagecompany
6.TheReporterwithCameraManatalawoffice
7.TheOSHAInspectoratabank
8.TheHiredConsultant(Whenasmallamountofaccessturnedintoalargeamount)
9.Whenjobsgowrong.(Walkthroughthestorywhereanengineerwasarrestedwhileperformingtheattack)
PartII:GainingConfidentialInformationWhileHiddenintheShadows
10.TheHallmarkGreetingcardandother"friendlyemail"attacks
11.TheFreeKeyboard.Whenfreecomeswithaseriousprice
12.Usingcorporateemailtogainconfidentialinformation
13.TheBillboardtakeover(Howwetookoveranelectronicbillboardsystemgivingaccesstopostourowninformationonboardsthroughouttheworld.)
14.HotelbusinesscentersandconferenceInternetcafés,thehackershomeawayfromhome
15.Wirelessaccesspointsandtheunseenrisks(Thischapterwillcovernotonlytherisksfoundinhotelsbutalsowhenemployeesusewirelesstobypassinternalcorporatesecurity)
16.Socialnetworkingandthemanyrisks
17.WhenATM'sbecomeAutomatedThievingMachines
18.UsingmusicCD'stoaccesspersonalcomputers
19.Phishing,VishingandSmishing,understandinghowtheseattacksworkfrominsideout