Techno Security's guide to managing risks : for IT managers, auditors, and investigators / Jack Wiles ; Russ Rogers, technical editor.
| Author/creator | Wiles, Jack |
| Format | Electronic |
| Publication Info | Burlington, Mass. : Elsevier, ©2007. |
| Description | 1 online resource (xxxix, 391 pages) : illustrations |
| Supplemental Content | Click to View |
| Subjects |
| Contents | Cover -- Contents -- Introduction -- Foreword -- Chapter 1. Social Engineering: Risks, Threats, Vulnerabilities, and Countermeasures -- Introduction -- How Easy Is It? -- Human Nature: Human Weakness -- Risk Management: Performing a Mini Risk Assessment -- Outsider-Insider Threats -- The Mind of a Social Engineer -- The Mind of a Victim -- Countermeasures: How Do Bad Guys Target Us, and What Can We Do About It -- Social Engineering Awareness: A War Story -- Answer to the Riddle -- Summary -- Chapter 2. Personal, Workforce, and Family Preparedness -- Introduction -- Threats -- Your Personal Preparedness Plan -- Summary -- Chapter 3. Seizure of Digital Information -- Introduction -- Defining Digital Evidence -- Digital Evidence Seizure Methodology -- Factors Limiting the Wholesale Seizure of Hardware -- Other Options for Seizing Digital Evidence -- Common Threads within Digital Evidence Seizure -- Determining the Most Appropriate Seizure Method -- Summary -- Works Cited -- Chapter 4. Handheld Forensics -- Digital Forensics -- What Is the Handheld Forensic Impact? -- Cellular Handling -- Evidence Preservation -- Maintain a Forensic Data Connection -- Analysis and Reporting -- Summary -- Bibliography -- Chapter 5. RFID: An Introduction to Security Issues and Concerns -- Introduction -- Background -- RFID Purposes -- Where Does RFID fit in? -- Technology Involved -- Summary -- Chapter 6. Open Source Intelligence -- Introduction -- Direction -- Discovery -- Summary -- Notes -- Chapter 7. Wireless Awareness: Increasing the Sophistication of Wireless Users -- Introduction -- Putting Together a War-Driving Team -- Increasing User Sophistication -- Summary -- Chapter 8. No-Tech Hacking -- Introduction: What Is "No-Tech Hacking?" -- Physical Security -- Lock Bumping -- Information Security -- Checklist -- Summary -- Notes -- Chapter 9. The Basics of Penetration Testing -- Introduction -- Know the Security Analysis Life Cycle -- Know When to Deviate -- The Penetration Tester Mentality -- The Penetration Methodology -- Summary -- Chapter 10. What Is Steganography? -- Introduction -- Defining Steganography -- Analog Steganography -- Digital Steganography -- The Six Categories of Steganography -- Types of Steganography -- Steganography Applied to Different Media -- Hiding in Network Packets -- Issues in Information Hiding -- Watermarking -- Steganography Tools -- Real-World Uses -- Detection and Attacks -- Summary -- Chapter 11. Insider Threat -- Introduction -- The Devil Inside -- The Importance of Insider Threat -- Why the Insider Threat Has Been Ignored -- Why the Insider Threat Is Worse Than the External Threat -- The Effect of Insider Threats on a Company -- How Bad Is It-Statistics on What Is Happening . -- Targets of Attack -- The Threat Is Real -- New World Order -- Future Trends -- Summary -- Index -- Last Page. |
| Abstract | Seasoned security experts have joined forces to create a guide to get and stay secure in a techno world! |
| General note | Includes index. |
| Access restriction | License restrictions may limit access. |
| Source of description | Description based on print version record. |
| Issued in other form | Print version: Wiles, Jack. Techno Security's guide to managing risks. Burlington, Mass. : Elsevier, c2007 1597491381 9781597491389 |
| Genre/form | Electronic books. |
| ISBN | 9780080553979 (electronic bk.) |
| ISBN | 0080553974 (electronic bk.) |
| ISBN | 1597491381 (pbk.) |
| ISBN | 9781597491389 (pbk.) |
| ISBN | 9786611071882 |
| ISBN | 6611071881 |