Techno Security's guide to managing risks : for IT managers, auditors, and investigators /

Main Author: Wiles, Jack.
Format: Book
Language:English
Published: Burlington, Mass. : Elsevier, ©2007.
Subjects:
Online Access:http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211556
Table of Contents:
  • Cover
  • Contents
  • Introduction
  • Foreword
  • Chapter 1. Social Engineering: Risks, Threats, Vulnerabilities, and Countermeasures
  • Introduction
  • How Easy Is It?
  • Human Nature: Human Weakness
  • Risk Management: Performing a Mini Risk Assessment
  • Outsider-Insider Threats
  • The Mind of a Social Engineer
  • The Mind of a Victim
  • Countermeasures: How Do Bad Guys Target Us, and What Can We Do About It
  • Social Engineering Awareness: A War Story
  • Answer to the Riddle
  • Summary
  • Chapter 2. Personal, Workforce, and Family Preparedness
  • Introduction
  • Threats
  • Your Personal Preparedness Plan
  • Summary
  • Chapter 3. Seizure of Digital Information
  • Introduction
  • Defining Digital Evidence
  • Digital Evidence Seizure Methodology
  • Factors Limiting the Wholesale Seizure of Hardware
  • Other Options for Seizing Digital Evidence
  • Common Threads within Digital Evidence Seizure
  • Determining the Most Appropriate Seizure Method
  • Summary
  • Works Cited
  • Chapter 4. Handheld Forensics
  • Digital Forensics
  • What Is the Handheld Forensic Impact?
  • Cellular Handling
  • Evidence Preservation
  • Maintain a Forensic Data Connection
  • Analysis and Reporting
  • Summary
  • Bibliography
  • Chapter 5. RFID: An Introduction to Security Issues and Concerns
  • Introduction
  • Background
  • RFID Purposes
  • Where Does RFID fit in?
  • Technology Involved
  • Summary
  • Chapter 6. Open Source Intelligence
  • Introduction
  • Direction
  • Discovery
  • Summary
  • Notes
  • Chapter 7. Wireless Awareness: Increasing the Sophistication of Wireless Users
  • Introduction
  • Putting Together a War-Driving Team
  • Increasing User Sophistication
  • Summary
  • Chapter 8. No-Tech Hacking
  • Introduction: What Is "No-Tech Hacking?"
  • Physical Security
  • Lock Bumping
  • Information Security
  • Checklist
  • Summary
  • Notes
  • Chapter 9. The Basics of Penetration Testing
  • Introduction
  • Know the Security Analysis Life Cycle
  • Know When to Deviate
  • The Penetration Tester Mentality
  • The Penetration Methodology
  • Summary
  • Chapter 10. What Is Steganography?
  • Introduction
  • Defining Steganography
  • Analog Steganography
  • Digital Steganography
  • The Six Categories of Steganography
  • Types of Steganography
  • Steganography Applied to Different Media
  • Hiding in Network Packets
  • Issues in Information Hiding
  • Watermarking
  • Steganography Tools
  • Real-World Uses
  • Detection and Attacks
  • Summary
  • Chapter 11. Insider Threat
  • Introduction
  • The Devil Inside
  • The Importance of Insider Threat
  • Why the Insider Threat Has Been Ignored
  • Why the Insider Threat Is Worse Than the External Threat
  • The Effect of Insider Threats on a Company
  • How Bad Is It-Statistics on What Is Happening .
  • Targets of Attack
  • The Threat Is Real
  • New World Order
  • Future Trends
  • Summary
  • Index
  • Last Page.