Confessions of a CIA Spy: The Art of Human Hacking
Confessions of a CIA Spy: The Art of Human Hacking
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they're high-profile individuals or entire organizations. His illustrative examples reveal:
- the motivations and objectives behind attempted breaches by foreign intelligence services, criminal groups, industrial competitors, activists and other threat actors
- how social media and carefully crafted insights into a victim's motivations and vulnerabilities are leveraged during phishing, smishing, vishing and other advanced social engineering operations to obtain even closely held information
- the psychology behind why humans are so susceptible to social engineering, and how influence techniques are used to circumvent established security protocols
- how spies and other social engineers use elicitation to legally procure protected information from victims who often have no idea they're being used
PRP: 154.92 Lei
Acesta este Pretul Recomandat de Producator. Pretul de vanzare al produsului este afisat mai jos.
139.43Lei
139.43Lei
154.92 LeiLivrare in 2-4 saptamani
Descrierea produsului
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they're high-profile individuals or entire organizations. His illustrative examples reveal:
- the motivations and objectives behind attempted breaches by foreign intelligence services, criminal groups, industrial competitors, activists and other threat actors
- how social media and carefully crafted insights into a victim's motivations and vulnerabilities are leveraged during phishing, smishing, vishing and other advanced social engineering operations to obtain even closely held information
- the psychology behind why humans are so susceptible to social engineering, and how influence techniques are used to circumvent established security protocols
- how spies and other social engineers use elicitation to legally procure protected information from victims who often have no idea they're being used
Detaliile produsului