Techno Security's guide to managing risks : for IT managers, auditors, and investigators /
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Burlington, Mass. :
Elsevier,
©2007.
|
Subjects: | |
Online Access: | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211556 |
Table of Contents:
- Cover
- Contents
- Introduction
- Foreword
- Chapter 1. Social Engineering: Risks, Threats, Vulnerabilities, and Countermeasures
- Introduction
- How Easy Is It?
- Human Nature: Human Weakness
- Risk Management: Performing a Mini Risk Assessment
- Outsider-Insider Threats
- The Mind of a Social Engineer
- The Mind of a Victim
- Countermeasures: How Do Bad Guys Target Us, and What Can We Do About It
- Social Engineering Awareness: A War Story
- Answer to the Riddle
- Summary
- Chapter 2. Personal, Workforce, and Family Preparedness
- Introduction
- Threats
- Your Personal Preparedness Plan
- Summary
- Chapter 3. Seizure of Digital Information
- Introduction
- Defining Digital Evidence
- Digital Evidence Seizure Methodology
- Factors Limiting the Wholesale Seizure of Hardware
- Other Options for Seizing Digital Evidence
- Common Threads within Digital Evidence Seizure
- Determining the Most Appropriate Seizure Method
- Summary
- Works Cited
- Chapter 4. Handheld Forensics
- Digital Forensics
- What Is the Handheld Forensic Impact?
- Cellular Handling
- Evidence Preservation
- Maintain a Forensic Data Connection
- Analysis and Reporting
- Summary
- Bibliography
- Chapter 5. RFID: An Introduction to Security Issues and Concerns
- Introduction
- Background
- RFID Purposes
- Where Does RFID fit in?
- Technology Involved
- Summary
- Chapter 6. Open Source Intelligence
- Introduction
- Direction
- Discovery
- Summary
- Notes
- Chapter 7. Wireless Awareness: Increasing the Sophistication of Wireless Users
- Introduction
- Putting Together a War-Driving Team
- Increasing User Sophistication
- Summary
- Chapter 8. No-Tech Hacking
- Introduction: What Is "No-Tech Hacking?"
- Physical Security
- Lock Bumping
- Information Security
- Checklist
- Summary
- Notes
- Chapter 9. The Basics of Penetration Testing
- Introduction
- Know the Security Analysis Life Cycle
- Know When to Deviate
- The Penetration Tester Mentality
- The Penetration Methodology
- Summary
- Chapter 10. What Is Steganography?
- Introduction
- Defining Steganography
- Analog Steganography
- Digital Steganography
- The Six Categories of Steganography
- Types of Steganography
- Steganography Applied to Different Media
- Hiding in Network Packets
- Issues in Information Hiding
- Watermarking
- Steganography Tools
- Real-World Uses
- Detection and Attacks
- Summary
- Chapter 11. Insider Threat
- Introduction
- The Devil Inside
- The Importance of Insider Threat
- Why the Insider Threat Has Been Ignored
- Why the Insider Threat Is Worse Than the External Threat
- The Effect of Insider Threats on a Company
- How Bad Is It-Statistics on What Is Happening .
- Targets of Attack
- The Threat Is Real
- New World Order
- Future Trends
- Summary
- Index
- Last Page.