Synopses & Reviews
The hacking industry costs corporations, governments and individuals milliions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking
focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and that their countermeasures work. He retired from his pen testing days UNDETECTED!
- Contains insider knowledge of what could be your most likely Low Tech threat
- Includes timely advice from some of the top security minds in the world
- Covers many detailed countermeasures that you can employ to improve your security posture
About the Author
Jack Wiles, (PPS, IAM, IEM) is a Security Professional with over 30 years of experience in security-related fields. This includes computer security, disaster recovery and physical security. He is a professional member of the National Speakers Association and has trained federal agents, corporate attorneys and internal auditors on a number of computer crime-related topics. He is a pioneer in presenting on a number of subjects that are now being labeled 'Homeland Security' topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a co-founder and President of TheTrainingCo., producers of the Annual Techno Security Conferences and the popular Techno Forensics conferences. He is in frequent contact with members of many state and local law enforcement agencies as well as Special Agents with the U.S. Secret Service, FBI, U.S. Customs, Department of Justice, The Department of Defense and numerous members of High-Tech Crime units. He was also appointed as the first President of the North Carolina InfraGard chapter that is now one of the largest chapters in the country. He is also a founding member and 'official' MC of the US Secret Service South Carolina Electronic Crimes Task Force. Jack is also a Vietnam veteran who served with the 101st Airborne Division in Vietnam in 1967-68. He recently retired from the U.S. Army Reserves as a lieutenant colonel and was assigned directly to the Pentagon for the final seven years of his career. In his spare time, he has been a senior contributing editor for several local, national and international magazines.Jennifer Jabbusch, CISSP, CISO, network security engineer and consultant with Carolina Advanced Digital, Inc., has more than 15 years' experience in the technology industry.
Jennifer Jabbusch, CISSP, CISO, network security engineer and consultant with Carolina Advanced Digital, Inc., has more than 15 years' experience in the technology industry.
Table of Contents
Chapter 1: Social Engineering: The Ultimate Low Tech Hacking Threat
Chapter 2: Low Tech Hacking: Physical Security-Still the Weakest Link
Chapter 3: Low Tech Hacking: More on Locks and How People Get Past Them
Chapter 4: Low Tech Wireless Hacking
Chapter 5: Low Tech Targeting and Surveillance: How Much Could They Find Out About You?
Chapter 6: Low Tech Hacking and the Law: Where Can You Go for Help?
Chapter 7: Security Awareness Training: Your Most Valuable Countermeasure
Chapter 8: Q&A with Senior Low Tech Experts: More Interviews and War Stories