|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Improve information security by learning Social Engineering. Key
Features Learn to implement information security using social
engineering Get hands-on experience of using different tools such
as Kali Linux, the Social Engineering toolkit and so on Practical
approach towards learning social engineering, for IT security Book
DescriptionThis book will provide you with a holistic understanding
of social engineering. It will help you to avoid and combat social
engineering attacks by giving you a detailed insight into how a
social engineer operates. Learn Social Engineering starts by giving
you a grounding in the different types of social engineering
attacks,and the damages they cause. It then sets up the lab
environment to use different toolS and then perform social
engineering steps such as information gathering. The book covers
topics from baiting, phishing, and spear phishing, to pretexting
and scareware. By the end of the book, you will be in a position to
protect yourself and your systems from social engineering threats
and attacks. All in all, the book covers social engineering from A
to Z , along with excerpts from many world wide known security
experts. What you will learn Learn to implement information
security using social engineering Learn social engineering for IT
security Understand the role of social media in social engineering
Get acquainted with Practical Human hacking skills Learn to think
like a social engineer Learn to beat a social engineer Who this
book is forThis book targets security professionals, security
analysts, penetration testers, or any stakeholder working with
information security who wants to learn how to use social
engineering techniques. Prior knowledge of Kali Linux is an added
advantage
In recent years, the growing popularity of mobile devices equipped
with GPS chips, in combination with the increasing availability of
wireless data connections, has led to an incremental rise in the
use of Location-Based Services (LBSs), namely applications in which
a user obtains, typically in real-time, a service related to his
current location. The growing popularity of location-based
services, allowing for the collection of vast amounts of
information regarding users' location, has started raising serious
privacy concerns. Methods for Location Privacy: A Comparative
Overview examines the various kinds of privacy breaches that may
arise due to the use of LBSs, and considers and compares some of
the mechanisms and the metrics that have been proposed to protect
user privacy, focusing in particular on a comparison between
probabilistic spatial obfuscation techniques.
|
|