Items related to Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking: Street Smarts for Security Professionals - Softcover

 
9781597496650: Low Tech Hacking: Street Smarts for Security Professionals
View all copies of this ISBN edition:
 
 

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world.

Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk.

This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.

  • Contains insider knowledge of what could be your most likely Low Tech threat
  • Includes timely advice from some of the top security minds in the world
  • Covers many detailed countermeasures that you can employ to improve your security posture

"synopsis" may belong to another edition of this title.

Review:

Top 10 List of Just a Few Things to Consider About the Locks that We Use at Home and at Work to Hopefully Make Physical Security Really Secure
By Jack Wiles, AKA “Low Tech Jack,” Lead Author, Low Tech Hacking
Jack Wiles

1. Learn More About Locks. Modern pin tumbler locks have been around, and virtually unchanged, since the mid 1800s. They have remained a mystery to most people until the Internet made the world a much smaller place. It's encouraging to see more people take an interest in learning how locks work, and how vulnerable some of them are to being bypassed using some very low-tech methods.

2. Check Your Locks. Locks are obviously mechanical devices and subject to mechanical malfunction. In every inside penetration test that I took part in, we found as least one lock that was not functioning because of lack of preventative maintenance or improper installation.

3. Buy Good Locks. When I'm in the hardware section of a store that sells locks, I like to watch people as they go about the process of selecting a lock for their home or school locker. Since most locks look pretty much the same on the outside, most people select the least expensive lock that they can find. These locks might work just fine, but from a security standpoint, as is usually the case, we get what we pay for. Invest just a little more and buy good locks.

4. Who Has The Keys To Your World At Work? Key control is absolutely critical in the business world. Many buildings have Master, Grand Master, and even Great Grand Master key coding systems. Many of these key systems have remained unchanged for years. It's important to know where these master keys (or any building keys for that matter) are, and who has copies of them. This is certainly the case if the keys use a key blank that is somewhat common and easily duplicated. I've been amazed to see the number of different key blanks that small key cutting vendors have on hand at local flea markets where keys can be duplicated for about $1, no questions asked.

5. Audit Your Locks. I've been preaching about the need to audit locks for many years now. I'm talking about a close functionality audit to insure that the locks are working properly, are installed properly, and that they show no signs of being tampered with, to include picking attempts. This audit could also be good Risk Management Due Diligence on an audit report.

6. Check Out YouTube. "If it's on YouTube, you had better know about it." While we were writing Low Tech Hacking, I found myself making that statement several times. YouTube is a great place to learn for the Good Guys, as well as any Bad Guys who want to see how things are done. If a picture is worth a thousand words, just how much is a 10- to 20-minute detailed video worth? If a lock picking or bypass method that describes the kind of locks that you have or use is described anywhere on the Internet, it's a good idea for you to know about it. The Bad Guys probably do!

7. Start a Lock Sport Enthusiast Group. When I started to learn about locksmithing back in the early 1970s, there were no lock sport enthusiast groups anywhere that I am aware of. Locksmithing and lock picking were more of a secretive art, and not something that the average person knew anything about. Two groups that I am aware of that encourage enthusiasts to make lock picking a sport, FALE Association of Lock Picking Enthusiasts and TOOOL The Open Organisation of Lockpickers, have websites where you can learn a lot about these interesting semi-ancient puzzles.

8. Don't Forget About Your Locks At Home. You just purchased a new (or new to you) home. Who has the keys to your new world? Unless your new home has very high security locks installed, you have no way of knowing who has a copy of the keys. For a home, I always suggest having the locks re-keyed, or installing new locks that you know won't work with whatever old keys are out there. That won't stop other methods of entry past those locks, but it will stop the lowest tech entry method of simply opening the door by using a copy of the original key. Key control and lock bypass methods in buildings is another story, and just as critical. That subject is addressed in our new Low Tech Hacking book in more detail than I can cover here.

9. Train Your Staff. Security Awareness Training is the most effective and overall least expensive security countermeasure that you can employ. Throughout the past 20 years, I have personally trained over 10,000 people in some form of awareness training, so I know how effective it can be. Employees want to help with security, and they will become an additional set of eyes and ears for a company when they are taught how important they are as a part of the security team. I don't provide awareness training anymore, so I'm not trying to sell training by this statement. It is important enough of a subject to me that I did have Mr. Sean Lowther write a complete chapter on the subject in our Low Tech Hacking book.

10. Purchase Deviant's Book--Practical Lock Picking. I really like Practical Lock Picking by Deviant Ollam (Syngress 2010). Our Low Tech Hacking book covers a number of other lock bypass methods, and we recommend Deviant's book to everyone interested in learning more about the art (and possible new hobby) of lock picking.

From the Back Cover:

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

"About this title" may belong to another edition of this title.

  • PublisherSyngress
  • Publication date2012
  • ISBN 10 1597496650
  • ISBN 13 9781597496650
  • BindingPaperback
  • Edition number1
  • Number of pages264
  • Rating

Top Search Results from the AbeBooks Marketplace

Stock Image

Gudaitis, Terry; Jabbusch, Jennifer; Rogers, Russ; Wiles, Jack; Lowther, Sean
Published by Syngress (2012)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Paperback Quantity: 1
Seller:
GoldenWavesOfBooks
(Fayetteville, TX, U.S.A.)

Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_1597496650

More information about this seller | Contact seller

Buy New
US$ 44.33
Convert currency

Add to Basket

Shipping: US$ 4.00
Within U.S.A.
Destination, rates & speeds
Stock Image

Gudaitis, Terry
Published by Syngress (2012)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Softcover Quantity: 1
Seller:
Front Cover Books
(Denver, CO, U.S.A.)

Book Description Condition: new. Seller Inventory # FrontCover1597496650

More information about this seller | Contact seller

Buy New
US$ 45.30
Convert currency

Add to Basket

Shipping: US$ 4.30
Within U.S.A.
Destination, rates & speeds
Stock Image

Gudaitis, Terry
Published by Syngress (2012)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Paperback Quantity: 1
Seller:
GoldBooks
(Denver, CO, U.S.A.)

Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think1597496650

More information about this seller | Contact seller

Buy New
US$ 45.45
Convert currency

Add to Basket

Shipping: US$ 4.25
Within U.S.A.
Destination, rates & speeds
Stock Image

Gudaitis, Terry
Published by Syngress (2012)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Paperback Quantity: 1
Seller:
Wizard Books
(Long Beach, CA, U.S.A.)

Book Description Paperback. Condition: new. New. Seller Inventory # Wizard1597496650

More information about this seller | Contact seller

Buy New
US$ 46.31
Convert currency

Add to Basket

Shipping: US$ 3.50
Within U.S.A.
Destination, rates & speeds
Stock Image

Gudaitis, Terry
Published by Syngress (2012)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Paperback Quantity: 1
Seller:
GoldenDragon
(Houston, TX, U.S.A.)

Book Description Paperback. Condition: new. Buy for Great customer experience. Seller Inventory # GoldenDragon1597496650

More information about this seller | Contact seller

Buy New
US$ 46.65
Convert currency

Add to Basket

Shipping: US$ 3.25
Within U.S.A.
Destination, rates & speeds
Stock Image

Jack Wiles
Published by Syngress Media,U.S. (2012)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Paperback / softback Quantity: 15
Seller:
THE SAINT BOOKSTORE
(Southport, United Kingdom)

Book Description Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. Seller Inventory # B9781597496650

More information about this seller | Contact seller

Buy New
US$ 43.44
Convert currency

Add to Basket

Shipping: US$ 11.15
From United Kingdom to U.S.A.
Destination, rates & speeds
Stock Image

Wiles, Jack/ Gudaitis, Terry/ Jabbusch, Jennifer
Published by Syngress Media Inc (2011)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Paperback Quantity: 2
Seller:
Revaluation Books
(Exeter, United Kingdom)

Book Description Paperback. Condition: Brand New. 1st edition. 264 pages. 9.30x7.50x0.90 inches. In Stock. Seller Inventory # __1597496650

More information about this seller | Contact seller

Buy New
US$ 43.89
Convert currency

Add to Basket

Shipping: US$ 12.45
From United Kingdom to U.S.A.
Destination, rates & speeds
Stock Image

Gudaitis, Terry; Jabbusch, Jennifer; Rogers, Russ; Wiles, Jack; Lowther, Sean
Published by Syngress (2012)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Softcover Quantity: > 20
Print on Demand
Seller:
Brook Bookstore On Demand
(Napoli, NA, Italy)

Book Description Condition: new. Questo è un articolo print on demand. Seller Inventory # 789b8cf515f1abce2c5162d5525dd7b6

More information about this seller | Contact seller

Buy New
US$ 47.86
Convert currency

Add to Basket

Shipping: US$ 11.91
From Italy to U.S.A.
Destination, rates & speeds
Stock Image

Jack Wiles,Terry Gudaitis,Jennifer Jabbusch,Russ Rogers,Sean Lowther
Published by Syngress 2011-12-19 (2011)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Paperback Quantity: > 20
Seller:
Chiron Media
(Wallingford, United Kingdom)

Book Description Paperback. Condition: New. Seller Inventory # 6666-ELS-9781597496650

More information about this seller | Contact seller

Buy New
US$ 42.48
Convert currency

Add to Basket

Shipping: US$ 18.67
From United Kingdom to U.S.A.
Destination, rates & speeds
Stock Image

Gudaitis, Terry; Jabbusch, Jennifer; Rogers, Russ; Wiles, Jack; Lowther, Sean
Published by Syngress (2012)
ISBN 10: 1597496650 ISBN 13: 9781597496650
New Softcover Quantity: 1
Seller:
GF Books, Inc.
(Hawthorne, CA, U.S.A.)

Book Description Condition: New. Book is in NEW condition. Seller Inventory # 1597496650-2-1

More information about this seller | Contact seller

Buy New
US$ 79.72
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds

There are more copies of this book

View all search results for this book