Hacking the Human: Social Engineering Techniques and Security Countermeasures, 1st Edition (Hardback) book cover

Hacking the Human

Social Engineering Techniques and Security Countermeasures, 1st Edition

By Ian Mann


266 pages

Purchasing Options:$ = USD
Hardback: 9780815389385
pub: 2017-11-29
SAVE ~$31.00
eBook (VitalSource) : 9781351156882
pub: 2017-11-28
from $27.48

FREE Standard Shipping!


Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.

Table of Contents

Contents: Introduction; Part One The Risks: What is social engineering?; Understanding your risks; People, your weakest link; Limitations to current security thinking. Part Two Understanding Human Vulnerabilities: Trust me; Reading a person; Subconscious mind; Parent, Adult, Child. Part Three Countermeasures: Vulnerability mapping; Protection systems; Awareness and Training; Testing. Index.

Subject Categories

BISAC Subject Codes/Headings:
COMPUTERS / Security / General