HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

The Art of Deception: Controlling the Human…
Loading...

The Art of Deception: Controlling the Human Element of Security

by Kevin D. Mitnick

MembersReviewsPopularityAverage ratingMentions
1,080137,731 (3.49)1
Recently added byprivate library, neurodove, MLBrook, HPszturmowa, jason.rathburn, yerbarob, andrei.volt, lacop
None

None.

Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 1 mention

English (12)  French (1)  All languages (13)
Showing 1-5 of 12 (next | show all)
The Art of Deception is written by a hacker (or, as he calls himself, a “social engineer”) and describes the ways in which hackers can exploit human nature to bypass security measures. The book was hyped as being “like reading the climaxes of a dozen complex thrillers”, but I don’t think it lived up that hype. Although I found it interesting to read about the clever ways hackers go about getting very classified information, it wasn’t exactly edge-of-your-seat reading.

Read the rest here... ( )
  DoingDewey | Nov 6, 2012 |
Didn't finish as the stories got repetitive.
  jcopenha | Jun 17, 2012 |
I had high hopes for this book: I've followed Mitnick's story for over a decade and have thoroughly enjoyed many of the books written about him and his exploits. I expected The Art of Deception to be no exception. Except it was.

The Art of Deception is more of a IT professional's handbook for preventing social engineering attacks on a corporation. There are two problems with this:

1) It's absolutely not, in any way, a book for casual readers looking to understand and discover some insights on the psychology of deception in a technical environment. If that's what you want, look elsewhere.

2) If an IT security professional working for any company needs a book this big to understand how to protect about social engineering... well they are in serious need of a career counselor and should consider a new profession.*

There's one more problem with the book: it's far too long, the stories are endlessly repetitive, and, well, everything else. Avoid.

*OK, that may be hyperbolic. But hear this, IT security professionals: buy this book, read the first chapter, then close it. Everything you need to know is in the first chapter. ( )
  fakelvis | Apr 2, 2012 |
Good information, however this thing read like a "....For Dummies" book. But worse. ( )
1 vote cafepithecus | Mar 23, 2011 |
This is a great collection of stories that illustrates the biggest security hole in every organization: the people. ( )
  AK_Doug | Feb 23, 2011 |
Showing 1-5 of 12 (next | show all)
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Information from the Italian Common Knowledge. Edit to localize it to the English one.
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
For Shelly Jaffe, Reba Vartanian, Chickie Leventhal, and Mithcell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello

For Arynne, Victoria, and David, Sheldon, Vincent, and Elena
First words
A company may have purchased the best security technologies that money can buy, trained their people so well that they lock up all their secrets before going home at night, and hired building guards from the best security firm in the business.
Quotations
Last words
(Click to show. Warning: May contain spoilers.)
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Information from the Italian Common Knowledge. Edit to localize it to the English one.
Original language

References to this work on external resources.

Wikipedia in English (4)

Book description
Haiku summary

Amazon.com Amazon.com Review (ISBN 076454280X, Paperback)

The Art of Deception is about gaining someone's trust by lying to them and then abusing that trust for fun and profit. Hackers use the euphemism "social engineering" and hacker-guru Kevin Mitnick examines many example scenarios.

After Mitnick's first dozen examples anyone responsible for organizational security is going to lose the will to live. It's been said before, but people and security are antithetical. Organizations exist to provide a good or service and want helpful, friendly employees to promote the good or service. People are social animals who want to be liked. Controlling the human aspects of security means denying someone something. This circle can't be squared.

Considering Mitnick's reputation as a hacker guru, it's ironic that the last point of attack for hackers using social engineering are computers. Most of the scenarios in The Art of Deception work just as well against computer-free organizations and were probably known to the Phoenicians; technology simply makes it all easier. Phones are faster than letters, after all, and having large organizations means dealing with lots of strangers.

Much of Mitnick's security advice sounds practical until you think about implementation, when you realize that more effective security means reducing organizational efficiency--an impossible trade in competitive business. And anyway, who wants to work in an organization where the rule is "Trust no one"? Mitnick shows how easily security is breached by trust, but without trust people can't live and work together. In the real world, effective organizations have to acknowledge that total security is a chimera--and carry more insurance. --Steve Patient, amazon.co.uk

(retrieved from Amazon Mon, 30 Sep 2013 13:31:35 -0400)

Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.… (more)

» see all 2 descriptions

Quick Links

Swap Ebooks Audio
4 avail.
90 wanted
4 pay4 pay

Popular covers

Rating

Average: (3.49)
0.5 3
1 5
1.5 1
2 17
2.5 2
3 70
3.5 12
4 70
4.5
5 32

Audible.com

Two editions of this book were published by Audible.com.

See editions

Is this you?

Become a LibraryThing Author.

 

Help/FAQs | About | Privacy/Terms | Blog | Contact | LibraryThing.com | APIs | WikiThing | Common Knowledge | Legacy Libraries | Early Reviewers | 93,488,459 books! | Top bar: Always visible