Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Books Media Book Reviews

The Art of Deception 241

MasterSLATE writes "One of the weakest links to the most secured computer systems are the humans that operate them. No matter how well secured a computer, network or information may be, there are always people that will have contact with them from the inside. This is what the social engineer exploits in order to gain access. In The Art of Deception, Kevin Mitnick writes about the human element and how it can be manipulated and exploited to gain access to computer systems or 'secure' information." Read on for the rest of Masterslate's review.
The Art of Deception
author Kevin Mitnick (& William L. Simon)
pages 346
publisher Wiley Publishing, Inc.
rating 9
reviewer MasterSLATE
ISBN 0471237124
summary Geared toward the company security guy, but a good read for anyone interested in security, especially social engineering

What's to Like?

The Art of Deception is extremely easy to understand and actually fun to read.

The first part of the book, Behind the Scenes contains the first chapter, Security's Weakest Link, which describes through many examples how and why the social engineer is able to so easily manipulate people to get what he wants.

Part 2, The Art of the Attacker, contains chapters 2-9, which describe various ways a social engineer can manipulate people over the phone. Each chapter tells of a different method that could be used to gain information. Each chapter also contains at least one example.

Part 3, Intruder Alert, contains chapters 10-14, which tell about different ways a social engineer can get inside a company, whether physically or through an internal contact. Each chapter contains at least one example.

Part 4, Raising the Bar, contains chapters 15 and 16, which explain how a company should create their security policies and training to prevent the social engineer from gaining access to sensitive information. These chapters are definitely more geared toward the executive, security analyst, or other specialist, as they contain specifics on what new policies should be implemented and why.

The last section in the book, Security at a Glance, contains some charts and information which should be read over by a more general audience, such as employees and other people that may be contacted by a social engineer.

And one sidenote: there's a nice little foreword by Woz (Steve Wozniak).

The Summary

Although this book is geared toward the company security expert, this book also has appeal to anyone with an interest in social engineering. I found it to be a quick and fun read. As a social engineer, this book taught me new tactics to try as well as ways that my targets might be prevented from giving me information I seek.

Table of Contents

Foreword
Preface
Introduction

Part 1 Behind the Scenes
* Chapter 1 Security's Weakest Link
Part 2 The Art of the Attacker
* Chapter 2 When Innocuous Information Isn't
* Chapter 3 The Direct Attack: Just Asking for It
* Chapter 4 Building Trust
* Chapter 5 "Let Me Help You"
* Chapter 6 "Can You Help Me?"
* Chapter 7 Phony Sites and Dangerous Attachments
* Chapter 8 Using Sympathy, Guilt and Intimidation
* Chapter 9 The Reverse Sting
Part 3 Intruder Alert
* Chapter 10 Entering the Premises
* Chapter 11 Combining Technology and Social Engineering
* Chapter 12 Attacks on the Entry-Level Employee
* Chapter 13 Clever Cons
* Chapter 14 Industrial Espionage
Part 4 Raising the Bar
* Chapter 15 Information Security Awareness and Training
* Chapter 16 Recommended Corporate Information Security Policies

Security at a Glance
Sources
Acknowledgments
Index


You can purchase The Art of Deception from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.

This discussion has been archived. No new comments can be posted.

The Art of Deception

Comments Filter:
  • Letter.. (Score:5, Funny)

    by grub ( 11606 ) <slashdot@grub.net> on Tuesday January 14, 2003 @12:39PM (#5081608) Homepage Journal

    Dear Amazon.com,

    I would like to get a copy of "The Art of Deception", however my grandmother needs surgery and I can't spare any money at the moment. If you'd like to lend me a copy please feel free to email for shipping information.

    I, and my grandmother, thank you.

    grubby
  • by Anonymous Coward on Tuesday January 14, 2003 @12:40PM (#5081614)

    As a social engineer, this book taught me new tactics to try as well as ways that my targets might be prevented from giving me information I seek.

    You misspelled "criminal".

  • Right here (Score:3, Funny)

    by Bastian ( 66383 ) on Tuesday January 14, 2003 @12:57PM (#5081741)
    The Art of Deception is extremely easy to understand and actually fun to read.
  • by mustangdavis ( 583344 ) on Tuesday January 14, 2003 @01:01PM (#5081762) Homepage Journal
    Chapter 7 Phony Sites and Dangerous Attachments



    More like:

    Chapter 7: Porn Sites and Dangerous Screen Savers

  • Re:Letter.. (Score:5, Funny)

    by Scratch-O-Matic ( 245992 ) on Tuesday January 14, 2003 @01:05PM (#5081789)
    Dear Mr. Grub...

    Hi, it's Scratch at Amazon. The suits here would never think of sending you something for free, but your story touched my heart, and I'd like to help. If you could send me the username and password of your Amazon account, I'd be happy to slip the order in for you, without charging your credit card.
  • by Tackhead ( 54550 ) on Tuesday January 14, 2003 @01:18PM (#5081870)
    From the article:
    >Part 2 The Art of the Attacker
    * Chapter 2 When Innocuous Information Isn't
    * Chapter 3 The Direct Attack: Just Asking for It
    * Chapter 4 Building Trust
    * Chapter 5 "Let Me Help You"
    * Chapter 6 "Can You Help Me?"
    * Chapter 7 Phony Sites and Dangerous Attachments
    * Chapter 8 Using Sympathy, Guilt and Intimidation
    * Chapter 9 The Reverse Sting

    From the poster:
    > Doesn't the US DCMA NOT allow for tools that bypass security? I wonder how soon it will be before someone tries to use the DCMA against someone who used social engineering.

    Don't worry, rumors to the effect that we're going to pass laws to extend DMCA to new areas happen all the time, they're pretty innocuous. Why don't you support us? We're just trying to make good laws, just like you're trying to make good code. If you're confused, that's OK, we've seen that before, let us help you with that.

    We're working with Senator Hollings (D-Dis), and we're considering new and novel approaches to promote consumer use of broadband. Can you help us help him to promote the use of consumer broadband?

    He's taken an awful lot of hard knocks lately over the SSSCA, er, CBDTPA, and some people in the halls of power (and some who have really big guns!) think it's partially Slashdot's fault and are kinda cheezed about it. But neither bill had a chance to be passed, and Senator Hollings (D-Dis) knew it when he put them forward. Surely an honest geek can make up for misunderstanding the Senator's intention, can't he?

    Did you know that Senator Hollings (D-Dis) is starting up a brand-new 2600 chapter in Washington, DC? Why not come to our first meeting and say hello!

  • by BigBir3d ( 454486 ) on Tuesday January 14, 2003 @01:34PM (#5081972) Journal
    "My name is Bond, James Bond."

    He always could get what he wanted from people.
  • by God! Awful 2 ( 631283 ) on Tuesday January 14, 2003 @01:36PM (#5081989) Journal

    It's called a KEY, Eisenstein. You can find them at the hardware store.

    LOL... if sarcastically calling someone Einstein implies that they are stupid, does sarcastically calling someone Eisenstein imply that they are spouting propaganda?

    -a
  • by zerOnIne ( 128186 ) on Tuesday January 14, 2003 @01:37PM (#5081993) Homepage
    What I'm really wondering about this book is, does it come with that Free Kevin I've seen advertised for so many years on all these websites? I mean, I think it's about time I got my Kevin, but only if it's really free. I can't afford to have to pay for a Kevin myself.
  • by Anonymous Coward on Tuesday January 14, 2003 @01:38PM (#5082001)
    Announcer voice: Now you can get Ronco's new decepto-matic - just call with you credit card (operators are standing by) ...

    What do you get?

    Part 1 Behind the Scenes
    * Chapter 1 Security's Weakest Link


    But that's not all. Act now and you will also receive ...

    Part 2 The Art of the Attacker
    * Chapter 2 When Innocuous Information Isn't
    * Chapter 3 The Direct Attack: Just Asking for It
    * Chapter 4 Building Trust
    * Chapter 5 "Let Me Help You"
    * Chapter 6 "Can You Help Me?"
    * Chapter 7 Phony Sites and Dangerous Attachments
    * Chapter 8 Using Sympathy, Guilt and Intimidation
    * Chapter 9 The Reverse Sting


    As though that weren't enough, you will also get:

    Part 3 Intruder Alert
    * Chapter 10 Entering the Premises
    * Chapter 11 Combining Technology and Social Engineering
    * Chapter 12 Attacks on the Entry-Level Employee
    * Chapter 13 Clever Cons
    * Chapter 14 Industrial Espionage


    And if you call in the next ten minutes, we'll include at no addional cost ...

    Part 4 Raising the Bar
    * Chapter 15 Information Security Awareness and Training
    * Chapter 16 Recommended Corporate Information Security Policies


    Now how much would you pay?
  • by skydude_20 ( 307538 ) on Tuesday January 14, 2003 @01:43PM (#5082033) Journal
    "The first part of the book... contains the first chapter"
  • by God! Awful 2 ( 631283 ) on Tuesday January 14, 2003 @01:53PM (#5082103) Journal

    Do not discount the possibility of someone stealing the box [slashdot.org].

    One of the purposes of the concrete is to make the box impossibly heavy. Also, for best results, the box should be surrounded by lasers in a locked room in a secret military facility hidden in the side of a volcano.

    Seriously though, I don't think this kind of precaution is something every business needs to take. This is for the army's root key, or maybe a large company with a very sensitive CA (e.g. Microsoft or Verisign).

    -a
  • by Badgerman ( 19207 ) on Tuesday January 14, 2003 @02:03PM (#5082185)
    To prevent cracking security in human beings. At least until God releases a patch.
  • by kisielk ( 467327 ) on Tuesday January 14, 2003 @02:10PM (#5082202)
    You're kidding right? Seems most slashdot readers can't even read a short article and post relavent comments on it. Here you're expecting one to read a BOOK and write a REVIEW? Maybe in an alternate universe ;)

Old programmers never die, they just hit account block limit.

Working...