The Art of Deception
Encyclopedia
The Art of Deception is a book by Kevin Mitnick
that covers the art of social engineering. Part of the book is composed of real stories, and examples of how social engineering can be combined with hacking
.
All, or nearly all, of the examples are fictional, but quite plausible. They expose the ease with which a skilled social engineer can subvert many rules most people take for granted. A few examples:
This book also, after giving an example, will tell what tricked/conned the victims of the scam, and how to prevent it in real life or business.
The book ends with Mitnick's strategy and business plans to prevent most if not all of the scams in the book.
Kevin Mitnick
Kevin David Mitnick is a computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States.-Personal life:Mitnick grew up in...
that covers the art of social engineering. Part of the book is composed of real stories, and examples of how social engineering can be combined with hacking
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...
.
All, or nearly all, of the examples are fictional, but quite plausible. They expose the ease with which a skilled social engineer can subvert many rules most people take for granted. A few examples:
- A person gets out of a speeding ticket by fooling the police into revealing a time when the arresting officer will be out of town, and then requesting a court date coinciding with that time.
- A person gains access to a company's internal computer system, guarded by a password that changes daily, by waiting for a snowstorm and then calling the network center posing as a snowed-in employee who wants to work from home, tricking the operator into revealing today's password and access through duplicity
- A person gains lots of proprietary information about a start-up company by waiting until the CEO is out of town, and then showing up at the company headquarters pretending to be a close friend and business associate of the CEO.
- A person gains access to a restricted area by approaching the door carrying a large box of books, and relying on people's propensity to hold the door open for others in that situation.
This book also, after giving an example, will tell what tricked/conned the victims of the scam, and how to prevent it in real life or business.
The book ends with Mitnick's strategy and business plans to prevent most if not all of the scams in the book.