O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image

CHAPTER 7

Low Tech: SocialEngineering and Physical Security

In this chapter you will learn about

• Defining social engineering

• Describing the different types of social-engineering attacks

• Describing insider attacks, reverse social engineering, dumpster diving, social networking, and URL obfuscation

• Describing phishing attacks and countermeasures

• Listing social-engineering countermeasures

• Describing physical security measures

image

When kids call home unexpectedly it usually means trouble; so when the phone rang that midsummer’s day in Huntsville, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required