Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Chapter 1: Social engineering: The ultim... > Chapter 1: Social engineering: The u... - Pg. 17

xvi Introduction personal data online. All security-minded readers will appreciate the introduction Jack provides to two agents from the U.S. Secret Service and F.B.I., and the insight they offer in the interview sections. Individuals, business owners, and those responsible for managing security of themselves, their families, and their businesses will benefit from this insight into the world of low tech hacks, physical intrusion and social engineering, and the mea- sures that can be taken to prevent becoming a victim of such attacks. From under- standing which padlocks to use for your kids' lockers, how to shop for secure home locks, to recognizing a false phone technician, the breadth and depth of attacks and countermeasures is enlightening for all audiences. HOW THIS BOOK IS ORGANIZED This book is comprised of eight chapters, each addressing a different facet of low tech hacking techniques and the countermeasures that accompany them. The chapters are written and assembled in a way that allows the reader to attain value from reading the book as a whole, or from reading individual chapters in any chosen order. There is a logical progression, starting with the opening chapter on Social Engineering: The Ultimate Low Tech Hacking Threat, followed by Low Tech Vulnerabilities: Physical Security, and More About Locks and Ways to Low Tech Hack Them in Chapters 2 and 3. Chapters 4 and beyond open into broader topics of low tech hacking, with subject areas that integrate well to give readers a multi- part approach to deal with low tech hacks and hackers. Chapter 1: Social engineering: The ultimate low tech hacking threat Jack Wiles presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Jack shares several examples of true stories to help the reader understand how social engineering attacks happen in homes and businesses, and how to prevent them. In this chapter, for the first time, Jack reveals the contents of his red team brief- case, never before shared with the public. In all the years of leading a red team to conduct physical penetration tests into corporations and federal facilities, Jack's team went undetected, a perfect record. The first three chapters of this book offer great insight from Jack's personal experience as to how they pulled it off. The first three chapters, as well as Chapter 7 are authored by Jack Wiles, re- nowned physical security specialist, professional speaker, inside penetration team leader, author and lead author of Low Tech Hacking.