did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780789739872

Corporate Insecurity True Stories of Corporate Espionage and Network Infiltration

by
  • ISBN13:

    9780789739872

  • ISBN10:

    0789739879

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2011-01-01
  • Publisher: Que Pub
  • Purchase Benefits
List Price: $24.99
We're Sorry.
No Options Available at This Time.

Summary

Do you assume that your bank, doctor, and accountant is securely storing your social security number? Do you assume your personal or business data will never be lost or stolen - and if it is, you'll be protected? Do you assume the big businesses you deal with are secure... or, at least, more secure than your own home? If you answered "Yes" to any of these questions, you're in for a rude awakening. Companies are only as secure as their weakest link - and, in Corporate Insecurity, one of the world's top white-hat hackers shows just how weak that link can be. Drawing on years of experience performing authorized break-ins at all sorts of organizations, Jim Stickley tells true security horror stories that, while entertaining, are ultimately terrifying. In an era when computer crime is at an all-time high, corporate America is being barraged with attacks from increasingly savvy thieves. From phishing to social networking, phony consultants to compromised hotel business centers, this book reveals how today's attacks are bringing IT security to its knees. Then, drawing on the expertise Stickley uses to defeat corporate security, he shows exactly how to toughen it. Whether you're an IT security specialist or a customer, this is one book you can't afford not to read

 

  • Frightening tales of corporate espionage that have never been told before
  • From-the-trenches advice on shoring up security holes: from technical issues to training, physical layouts to security mindsets
  • By Jim Stickley, one of the world's most well-known experts on corporate security and identity theft
  • Author Biography

    Jim Stickley, CTO and VP of Engineering for TraceSecurity, is an internationally renowned security expert. He directs TraceSecurity's company strategy in developing and releasing multiple versions of security software used by hundreds of clients. One of TraceSecurity's original founders, he has provided thousands of security services for financial institutions, Fortune® 100 firms, healthcare facilities, legal firms, and insurers. Stickley has been showcased on NBC Nightly News, CNN NewsNight, CNBC's The Big Idea, and NBC's Today Show, and quoted in Time, BusinessWeek, Fortune, The New York Times, and PC Magazine and Security Focus. He is author of The Truth About Identity Theft.

    Table of Contents

    Part I: Breaking in While They Watch

    1. The Fire Inspector at a bank
    2. The Russian Diplomat at a government facility
    3. The Pest Inspector at a credit union
    4. The Air Conditioning Technician at the Lottery
    5. The Cube Consultant at a mortgage company
    6. The Reporter with Camera Man at a law office
    7. The OSHA Inspector at a bank
    8. The Hired Consultant (When a small amount of access turned into a large amount)
    9. When jobs go wrong. (Walk through the story where an engineer was arrested while performing the attack)

    Part II: Gaining Confidential Information While Hidden in the Shadows

    10. The Hallmark Greeting card and other "friendly email" attacks
    11. The Free Keyboard. When free comes with a serious price
    12. Using corporate email to gain confidential information
    13. The Billboard takeover (How we took over an electronic billboard system giving access to post our own information on boards throughout the world.)
    14. Hotel business centers and conference Internet cafés, the hackers home away from home
    15. Wireless access points and the unseen risks (This chapter will cover not only the risks found in hotels but also when employees use wireless to bypass internal corporate security)
    16. Social networking and the many risks
    17. When ATM's become Automated Thieving Machines
    18. Using music CD's to access personal computers
    19. Phishing, Vishing and Smishing, understanding how these attacks work from inside out

    Supplemental Materials

    What is included with this book?

    The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

    The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

    Rewards Program