

The source of the book
This book is published for the public benefit under a Creative Commons license, or with the permission of the author or publisher. If you have any objections to its publication, please contact us.
Unauthorised Access: Physical Penetration Testing For IT Security Teams
(0)
Author:
Kevin MitnickNumber Of Downloads:
108
Number Of Reads:
8
Language:
English
File Size:
5.64 MB
Category:
TechnologySection:
Pages:
467
Quality:
good
Views:
1849
Quate
Review
Save
Share
Book Description
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.
Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importanceDeals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channelsIncludes safeguards for consultants paid to probe facilities unbeknown to staffCovers preparing the report and presenting it to management
In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.
Kevin Mitnick
Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.
Kevin and his Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees—learn how to protect their information and themselves from harm, using understandable terms and a friendly approach.
Kevin’s insights on current events are highly sought, leading to hundreds of media appearances. He has been a commentator, security analyst, or interview subject on CNN, CNBC, Al Jazeera, FOX News, CBC, BBC, Radio Moscow, Tech TV, National Public Radio, Playboy, Good Morning America, and 60 Minutes—to name just a few. He has been called before Congress (both the House and the Senate) to testify on security matters affecting the United States. Kevin also works in partnership with KnowBe4 to produce critically acclaimed security-awareness training programs to counteract social engineering and to improve security effectiveness.
Kevin's books include 'Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers' and 'Art of Deception: Controlling the Human Element of Security', which are mandatory readings for security professionals. His autobiography, 'Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker', a New York Times best seller, is now available in fifteen languages.
Read More
Sorry, this book file is currently unavailable. We're working on a full website update, and the file will be uploaded soon. Thank you for your patience and interest.
Rate Now
1 Stars
2 Stars
3 Stars
4 Stars
5 Stars
Quotes
Top Rated
Latest
Quate
Be the first to leave a quote and earn 10 points
instead of 3
Comments
Be the first to leave a comment and earn 5 points
instead of 3