The Art of Deception: Controlling the Human Element of Security

The world s most infamous hacker offers an insider s view of the low tech threats to high tech security Kevin Mitnick s exploits as a cyber desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries Since his release from federal prison, in 1998, Mitnick has turned his life around andThe world s most infamous hacker offers an insider s view of the low tech threats to high tech security Kevin Mitnick s exploits as a cyber desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought after computer security experts worldwide Now, in The Art of Deception, the world s most notorious hacker gives new meaning to the old adage, It takes a thief to catch a thief Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked down information systems are to a slick con artist impersonating an IRS agent Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true crime novel And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
The Art of Deception Controlling the Human Element of Security The world s most infamous hacker offers an insider s view of the low tech threats to high tech security Kevin Mitnick s exploits as a cyber desperado and fugitive form one of the most exhaustive FBI m

  • Title: The Art of Deception: Controlling the Human Element of Security
  • Author: Kevin D. Mitnick William L. Simon Steve Wozniak
  • ISBN: 9780764542800
  • Page: 279
  • Format: Paperback
    • [PDF] ↠ Unlimited Ù The Art of Deception: Controlling the Human Element of Security : by Kevin D. Mitnick William L. Simon Steve Wozniak ✓
      279 Kevin D. Mitnick William L. Simon Steve Wozniak
    • thumbnail Title: [PDF] ↠ Unlimited Ù The Art of Deception: Controlling the Human Element of Security : by Kevin D. Mitnick William L. Simon Steve Wozniak ✓
      Posted by:Kevin D. Mitnick William L. Simon Steve Wozniak
      Published :2018-06-10T19:57:53+00:00

    About the Author

    Kevin D. Mitnick William L. Simon Steve Wozniak

    Kevin Mitnick, the world s most famous former computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would be hackers, and a one time most wanted criminal of cyberspace, on the run from the bewildered Feds Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, and even testified in front of Congress He is the author of The Art of Deception and The Art of Intrusion Co author William Simon is a bestselling co author of numerous books, including iCon the biography of Steve Jobs and Kevin Mitnick s previous two books He has also written for USA Today and The Washington Post and been interviewed on CNBC, CNN, NPR and by The New York Times, The Wall Street Journal, BusinessWeek, Time, Newsweek, and many other publications.

    613 Comment

    • David said:
      Sep 24, 2018 - 19:57 PM

      Kevin Mitnick, probably the most famous (and controversial) computer hacker of the 1990's, has spent several years of his life on the run, as well as a few years in jail. For years after leaving prison he was forbidden to log on to a computer, a prohibition he appealed successfully. He now runs a computer security business, lectures to large corporations, and has co-authored two books on computer network security. This book focuses on the human element of computer security. Reminding us that eve [...]

    • Rod Hilton said:
      Sep 24, 2018 - 19:57 PM

      The Art of Deception is one of two books by famous hacker Kevin Mitnick, the other being "The Art of Intrusion". Intrusion focuses primarily on physical or technological hacks, while this book focuses almost exclusively on social engineering attacks.A number of problems prevented this book from being very good. The main problem is simply that Mitnick did not have enough material to fill an entire book. This book would have been better if it were shorter and simply one section in a larger book ab [...]

    • Pramod Nair said:
      Sep 24, 2018 - 19:57 PM

      “I went to prison for my hacking. Now people hire me to do the same things I went to prison for, but in a legal and beneficial way.” – Kevin D. Mitnick, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker.Reading ‘The Art of Deception’ is like hearing it straight from the horse's mouth. Kevin D. Mitnick, one of the legendary cyber desperado turned computer security consultant, takes the reader into the complex, supremely confident – often misunderstood as arrogance an [...]

    • Derek said:
      Sep 24, 2018 - 19:57 PM

      I suspect that if you're reading for entertainment, then you probably want Mitnick's The Art of Intrusion or Ghost in the Wires instead. This book is split 2/3 and 1/3 between a series of fictionalized anecdotes--based on or representative of real incidents--and a corporate policy guide. The guide, like all such specifications, is deadly dry and would require several readings and much thought to fully internalize.The anecdotes are more interesting than entertaining, and all proceed by the same b [...]

    • Atila Iamarino said:
      Sep 24, 2018 - 19:57 PM

      Um bom livro sobre aquele hacking moleque, aquele hacking arte, que era muito praticado antigamente. Boas histórias de como os melhores sistemas de segurança podem ser burlados com algumas ligações ou uma busca no lixo. Ele passa por algumas noções de programas e cyberataques (em muito menos detalhes do que o Social Engineering: The Art of Human Hacking), mas a maior parte do hacking que ele descreve é feita com saliva e astúcia.Não é um livro tão útil atualmente, especialmente com a [...]

    • John said:
      Sep 24, 2018 - 19:57 PM

      We think of computer hackers as sitting in an isolated room, endlessly probing corporate and private networks from their screen. Actually, almost all deep hacking starts with the manipulation of people to do something that allows the hacker to move to the next level. The Art of Deception tells how Mitnick used "social engineering" skills to get people to unknowingly provide critical assistance, from simply being polite and opening a secure door to setting up restricted user accounts. Having read [...]

    • James said:
      Sep 24, 2018 - 19:57 PM

      So Interesting read. Social engineering has been going on a long time and has impacted many corporations, governments, etc. I felt this book did a great job documenting examples of what has taken place as well as provided insights for what you and your organization can do to help prevent, the best that you can, social engineering attacks. This book definitely irritated me as I had not thought about the detailed level of attacks folks have gone through. Thinking back, there have probably been so [...]

    • Kökten Birant said:
      Sep 24, 2018 - 19:57 PM

      Eğlenceli ve en önemlisi de gerçek Kesinlikle teknik ve zorlayıcı karmaşık değil. Herkes Hacker olabilir, yeter ki biraz kafası çalışsın seviyesinde anlatıyor Özellikle olay anlatımları çok başarılı

    • Gwanderson said:
      Sep 24, 2018 - 19:57 PM

      Human's are like bad Microsoft coding.

    • Tomáš said:
      Sep 24, 2018 - 19:57 PM

      Kéž bych knížku četl před 15 lety, bylo by to minimálně o hvězdu víc. Z věcného hlediska jsem se moc nového nedozvěděl. Éra faxů a pevných linek je již pryč. A kdo sleduje seriál Mr.Robot, ví svý ;-) Z hlediska bezpečnosti je ale podle mě situace ještě horší než před lety - přibývá technologických vymožeností a s každou i nové druhy zranitelností a útoků. Největší slabinou ale stále zůstáváme my, lidé, a proto je knížka stále aktuální a důl [...]

    • Remo said:
      Sep 24, 2018 - 19:57 PM

      Me crucé con este libro (está en la mula, por supuesto) y me lo he devorado en dos días. Hay una segunda parte, The Art of Intrusion, que parece que está incluso mejor. Kevin Mitnick se hizo bastante famoso, para su desgracia, cuando le condenaron a unos cuantos años de cárcel por diversos delitos contra la seguridad electrónica de varias empresas y agencias estatales norteamericanas (nada grave según él, el holocausto informático según el fiscal). La (Kevin Mitnick, Kevin Mitnick ) [...]

    • Khalid said:
      Sep 24, 2018 - 19:57 PM

      In The Art of Deception, [Kevin Mitnick] discusses the thing he's best at: Social Engineering. Social engineering is the term used in computer security to describe the manipulation of humans in order to break through a security barrier, and is sometimes referred to as hacking the mind. In the first chapter of his book, usually referred to as The Lost Chapter (As it wasn't published with the final version of the book), Kevin Mitnick tries to convince his readers that he is innocent – or at leas [...]

    • Koen Crolla said:
      Sep 24, 2018 - 19:57 PM

      Almost all of this book consists of infinitesimal variations on the same point, communicated through accounts of apparently real events fictionalised by someone who clearly desperately wanted to write short stories instead of ghost-writing for minor celebrities but couldn't find a publisher for them. That every story reads like a bad (and I mean bad) noir film isn't just annoying; it makes them much less credible.It's clear that Mitnick thinks very highly of himself and his accomplishments, occa [...]

    • Phan said:
      Sep 24, 2018 - 19:57 PM

      Kevin D. Mitnick - a former hacker turned security expert - gives an excellent view on security threats posed by human factor in modern world. The common sense that computer geeks are often fat, unpopular with heavy glasses and nerdy faces is not applicable in "Social Engineer" category. Social engineer is someone with talent and understanding for both social behavior and technical command. He/she can infiltrate in a company system by manipulating human psychology (unshakeable confidence, empath [...]

    • G.M. Lupo said:
      Sep 24, 2018 - 19:57 PM

      Kevin Mitnick is probably best known for being a phone phreak and fugitive computer hacker in the late-80s and early 90s, who was the focus of a considerable manhunt. Following his capture and time in prison, he's become an Internet security consultant and turned his talents to helping people avoid the sort of hacks he became famous for perpetrating. This book is a chronicle of numerous social engineering attacks, some hypothetical, some based on real-world examples (which may or may not have be [...]

    • Russell said:
      Sep 24, 2018 - 19:57 PM

      I found the most valuable sections in this book to be the policy recommendations and information security practices described in the last chapters (despite their age). The anecdotal and fictionalized scenarios were effective up to a point, but there are so many of them that it wore me down and I just started scanning them when I was about 3/4 of the way through. Mitnick's "messages" provided helpful suggestions and contextual gotchas interspersed with the social engineering/con situations, but t [...]

    • Azamali said:
      Sep 24, 2018 - 19:57 PM

      Table of ContentsPart 1 Behind the ScenesChapter 1 Security's Weakest LinkPart 2 The Art of the AttackerChapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse StingPart 3 Intruder AlertChapter 10 Entering the PremisesChapter 11 Combining Technology and Social Eng [...]

    • Jeff said:
      Sep 24, 2018 - 19:57 PM

      Zzzzzzzzzz, Oh sorry This was a tough read. Very dry and if you've ever worked in a corporate environment, or IT at all, most of this is simply common sense.Some of the 'examples' used are repeated in Kevin's other book, Ghost in the Wires, which I read before this one. GitW is a good read, this one, not so much

    • Stefan said:
      Sep 24, 2018 - 19:57 PM

      While the book demonstrates the basic concept of social engineering quite well, it would never have got so much attention if Mitnick's name wasn't on the cover. It's okay, but it's not extraordinary.

    • Stephen said:
      Sep 24, 2018 - 19:57 PM

      Interesting at first, but very repetitive. Mitnick, who claims his career as a hacker was passed solely on manipulating people to gain information and access, shares stories of others who did the same. These mostly include private investigators, with at least one pair of curious teenagers and a few bits of corporate espionage. The modus operandi in all the cases is very similar: the actor engages in background research to learn a few names and some of the lingo of the business, then makes phone [...]

    • Aron said:
      Sep 24, 2018 - 19:57 PM

      As the title suggests, the focus of this book is social engineering-based security threats. While I think it's generally accepted that this is the least controllable and therefore weakest element of security, if you're wondering how this ballooned into 350 pageswell, I am, too. The summary of pretty much every story in every chapter is "be sure to conclusively verify the identity of anyone you're giving information to."While I picked this up completely voluntarily, reading it was a chore. It was [...]

    • Sergen said:
      Sep 24, 2018 - 19:57 PM

      lisede "aa kitaba bak önce sevgili yap ondan sonra aldatmasını biz öğretiriz kitap okumana gerek yok" tepkisini almama neden olan kitaptır. kevin amcanın yaptığı ve yaşadığı dönemde arkadaşları tarafından yapılan sosyal mühendislik hikayelerini bir araya getirip okuyucuya ders çıkarmasını sağlayan bir kitap. tabi günümüz insanı o zaman yaşayanlardan farklı bu kitapta bulunan saldırı şekillerinden çoğu şu an geçersiz ancak tabi bazılarının hala geçerlili [...]

    • stefanddddddd said:
      Sep 24, 2018 - 19:57 PM

      nice overview of techniques used in social engineering. unfortunately, the last part of the book transforms into a user manual for security consultants, while claiming it should not be used as such because it is a novel after all. could have been replaced with a few more interesting stories from the field.

    • Michelle Tran said:
      Sep 24, 2018 - 19:57 PM

      This book annoyed me because the main takeaway seems to be "TRUST NOBODY". Although it is interesting to see the ways we can take advantage of human trust, I feel like there was too much veneration of attackers and how awesome they are for taking advantage of people trying to be helpful. I'm abandoning this book because it as many of the examples are quite dated.

    • Arushit Mudgal said:
      Sep 24, 2018 - 19:57 PM

      The book talks about Social-Engineering but get repetitive, Mitnick tells the same story by changing few not important elements. He explains each and every technical term so the book is mainly targeted towards Businessmen

    • Allisonperkel said:
      Sep 24, 2018 - 19:57 PM

      The cardinal sin is padding out an shorter book and making it 3x the size is very much at play here. The book is boring. The book is out of date - though some of the cons described are still going on. Others not so much. Really, just not good. I ended up skimming the last 2 chapters.

    • Ginc Zivers said:
      Sep 24, 2018 - 19:57 PM

      Great book about social engeniers, we always tend to forgwt about. Strong passwords and secure network is nothing when you have the weak link - human. Good book to understand how they work and how they might get what they want. Every company neads to have these rules set. It is very important.

    • Scott said:
      Sep 24, 2018 - 19:57 PM

      First read this as a text book for a class on computer Security and Network Forensics. Great read on how most computer breaches happen not by actual hacking but by social engineering I would recommend this for anyone wanting to learn more about hacking

    • Jules said:
      Sep 24, 2018 - 19:57 PM

      Will change what you think a hacker is (or 'was' actually, because this book has a nice flavour of the 90's): Much less coding than expected, much more phone calls and acting. Interesting!

    • Nidhal Ben Tahar said:
      Sep 24, 2018 - 19:57 PM

      Disappointing. Kevin the security consultant, not Kevin the hacker, wrote it. Books about governance and security best practices were very low in my reading list, but after this one they's out of it.

    Leave a Reply