Take a photo of a barcode or cover
51 reviews for:
A Arte de Enganar - Ataques de Hackers: Controlando o Fator Humano na Segurança da Informação
William L. Simon, Kevin D. Mitnick
51 reviews for:
A Arte de Enganar - Ataques de Hackers: Controlando o Fator Humano na Segurança da Informação
William L. Simon, Kevin D. Mitnick
This book remains extremely relevant to system security problems. Kevin Mitnick, one of the most effective hackers in the end of 20th century describes simple examples that tear at the seems of organised corporate culture security. Really, everyone should have a read to get a sense of how systems can suffer huge damaging impact despite them being carefully certified, monitored and updated. Psychology can have more impact that technology.
It's a decent book with numerous accounts of Social Engineering attacks that are quite interesting. Unfortunately, it's also somewhat like a textbook, with random notes and definitions thrown in that are quite easy to pick up just by reading the text.
Additionally, the end result is that no company can ever be completely immune from social engineering attack - no surprises there.
Additionally, the end result is that no company can ever be completely immune from social engineering attack - no surprises there.
There are a lot of interesting and concerning examples in this book of how manipulation can affect a business. I enjoyed reading through these examples to understand how such an individual thinks and how to protect against them. With an interest in a career in cybersecurity, I think this is a good reference. The last chapter is very dry, but provides very usable procedures for companies. The casual reader might get tired through this chapter; the corporate reader, however, should take heed.
The entire book is basically 200 pages of anecdotes illustrating that people can compromise security even with elaborate technical systems in place by seeking seemingly unimportant information from people who don't know better. It's a fun read with some good info, and the 2002-era tech stuff is entertaining. Not especially well-organized and a bit repetitive, but that's how books like this are.
i'm not going to lie; i picked this up entirely because i heard it was one of the books matt bomer read as research for his con man role on 'white collar'. i skipped over most of the "how to protect your business from hackers" stuff and just read the con stories, which were admittedly interesting. good research for if i ever end up writing about cons or scams, for sure. and it's funny to see some of the schemes and names that the writers of 'white collar' lifted right from the book. quick, easy read; my inner spy-flick freak was appeased.
I think one of the key requirements of a great non-fiction book is the ability to come back and learn something new from it, despite how many times you have read it or how old it is — you might discover something you passed on one time is now highly relevant due to a shift in the landscape or new information that has emerged.
In the world of computing and technology, books often become quickly outdated -- fundamental concepts change and often times, the very technology itself is replaced by newer and shinier things.
Outside of a few notable exceptions ("The C Programming Language" by Kernighan and Ritchie, "The Art of Computer Programming" series by Knuth or the "Mythical Man-Month" by Brooks are examples that come to mind), the computing section of book stores typically doesn't have many books originally written in 2001 still sitting on the shelf, however, "The Art of Deception" still is and still sells.
Despite being highly relevant when it was first released (and a premonition of things to come), I'd argue that its' relevance has only continued to increase and fully believe that in 20 years from today, it will still continue to be relevant.
In 2001, uses of social engineering resulted in the "ILOVEYOU" virus, in the time since this book, we have seen oil pipelines shutdown due to ransomware attacks, attacks on uranium enrichment facilities due to social engineering attacks on individuals inate sense of curiosity and scam calls that trick individuals into sending gift cards to pay supposed tax bills.
Let's be clear though about one thing -- with a book that is 20 years old, many of the technology examples may be out of date, but it's important to keep in mind that despite it being a computing and technology book, this book is almost more of a psychology book about the social engineering mindset that is highly relevant to those in the computing and technology fields.
The examples in this book are timeless when you think more about the underlying concepts beneath them. While this line of thinking may be obvious to those in security, it may be less obvious why others continue to fall for what should be seen as obvious -- you need to think in an adversarial manner about social engineering so that you can adequately train and defend against it.
When I first picked this book up in 2004, I was 15 years old -- in that time, many books have came and left, however, this book has always stuck around. I can say with confidence that the likelihood of it ever leaving my bookshelf is unthinkable.
In the world of computing and technology, books often become quickly outdated -- fundamental concepts change and often times, the very technology itself is replaced by newer and shinier things.
Outside of a few notable exceptions ("The C Programming Language" by Kernighan and Ritchie, "The Art of Computer Programming" series by Knuth or the "Mythical Man-Month" by Brooks are examples that come to mind), the computing section of book stores typically doesn't have many books originally written in 2001 still sitting on the shelf, however, "The Art of Deception" still is and still sells.
Despite being highly relevant when it was first released (and a premonition of things to come), I'd argue that its' relevance has only continued to increase and fully believe that in 20 years from today, it will still continue to be relevant.
In 2001, uses of social engineering resulted in the "ILOVEYOU" virus, in the time since this book, we have seen oil pipelines shutdown due to ransomware attacks, attacks on uranium enrichment facilities due to social engineering attacks on individuals inate sense of curiosity and scam calls that trick individuals into sending gift cards to pay supposed tax bills.
Let's be clear though about one thing -- with a book that is 20 years old, many of the technology examples may be out of date, but it's important to keep in mind that despite it being a computing and technology book, this book is almost more of a psychology book about the social engineering mindset that is highly relevant to those in the computing and technology fields.
The examples in this book are timeless when you think more about the underlying concepts beneath them. While this line of thinking may be obvious to those in security, it may be less obvious why others continue to fall for what should be seen as obvious -- you need to think in an adversarial manner about social engineering so that you can adequately train and defend against it.
When I first picked this book up in 2004, I was 15 years old -- in that time, many books have came and left, however, this book has always stuck around. I can say with confidence that the likelihood of it ever leaving my bookshelf is unthinkable.
funny
informative
reflective
slow-paced
Very informative! An interesting overview of social engineering techniques. Possibly quite useful if you want to protect yourself against it, although that part of the book is mostly geared towards businesses.
informative
slow-paced
Book very much geared towards the non-technical or very naive. While a good resource for those groups, there is nothing new for those with experience in IT security.