Online Book Reader

Home Category

The Art of Deception_ Controlling the Human Element of Security - Kevin D. Mitnick [175]

By Root 1140 0
on

verification

See also training

employee number, disclosing

employment agency, social engineering use by

employment status, verification

encryption

of backup and stored files

keys

password.

voice message

Web site information

entry, illegal

enumeration

espionage, corporate (industrial)

F

favors, returning

fax

electronic

forwarding of

use policy

fear, use of

Federal Bureau of Investigation (FBI)

files, transfer of

File Transfer Protocol (FTP)

financial industry, vulnerability of

firewall

foreign country, email drops in

G

gender, of social engineers

government, information available on the Internet

gratitude, playing upon

grifters

guest account

gzip

H

hackers

hash, password

head-hunters, social engineering use by

help desk policies

human nature, tendencies of

human resources, policies for

I

identification

two-factor authentication

verification

identity theft

illusion, of security

impersonation

of company employee

of police officer

incident reporting

information

disclosure

gaining access to seemingly innocuous

hidden value of

as poker chip

responding to request for

information broker

Information Owner

information technology (IT) policies

innocence, organizational

insiders, threat from

installation, silent

Internal data classification

Internet

dead drop site

government information available on

hacking tools available on

password default list available on

phony sites

intimidation, by using authority

intranet, content of

intruders

K

keystrokes, monitoring

L

L0phterack3 utility

labeling items

law enforcement agencies

eavesdropping on

NCIC manual

procedures, learning about

thrill of deceiving

least privilege, rule of

license plate, old

lingo

LOCK-11

lock icon, Web page.

locks, picking

login simulator

loop-around phone number

M

mail bin, intracompany

mailbox, general departmental

mail drop

malicious code

malware (malicious software)

mark

marketing company case study

Mechanized Line Assignment Center (MLAC)

media, disposal of

Merchant ID,

modem, dial-in

monitoring program, computer

movie industry case study

N

name-dropping.

names, planting in corporate database

National Crime Information Center (NCIC)

need to know, verification

network outage case study

newsgroups

non-employees, criteria for verifying

O

obscurity, security through

operating system configuration

Oracle Corporation

out-of-towner case study

P

parents, social engineering by

password

brute force attack

choosing

dial-up remote access

default

delivery of new.

dictionary attack

disclosure of

discovery by login simulator use

dynamic

encryption.

guest account

hacking program

hash

null

plaintext

policies

resetting

screen saver

sharing

shoulder surfing to obtain

spyware capture ot

telephone switch

training on security of

patch

PayPal

payroll files, accessing

penetration testing

persuasion, art of friendly

phone administration policies

phone numbers

ANI (automatic number identification)

caller ID,

for Customer Name and Address bureau

dial-in access, disclosing

finding with cable and pair number

internal, disclosing

line verification

loop-around

reprogramming

restricted extensions

reverse lookup.

for telephone switch

Test Number Directory

unlisted, obtaining

on voice mail greeting

phone system, automated

phreaks, phone

physical security, policies for

piggybacking

poker chip, information

police scam case study

policies, security

consequences for violating

data classification

definition

development, steps in

employee

computer use

email use

fax use

general

passwords

phone use

voice mail use

human resources

incident

Return Main Page Previous Page Next Page

®Online Book Reader