Chapter 5. Solutions in this chapter:

  • Attacking SSL: Hacking the User
  • Recognizing an SE Attack
  • Responding to an SE Event
  • Defending Against Social Engineering Attacks
  • Social Engineering Scenarios for Awareness Training
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

SSL has become the de facto standard for security transactions on the Internet. History proves it's a secure protocol and continued development provides real security improvements. Unfortunately, this protocol has provided a false sense of safety for the security and financial fields. SSL protocol can be breached based on the shortcomings of the user. This chapter will provide you with the information to protect SSL from compromise and help you develop a security ...

Get Next Generation SSH2 Implementation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.