O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

The Social Engineering Engagement

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

Security issues within an organization extend far beyond the realms of firewalls and anti-virus, and into the weaknesses surrounding how your people conduct themselves on a day-to-day basis. This chapter will walk you through the process and associated challenges of engaging a third party to perform social engineering work. The challenges are how to manage the delivery of this work according to typically strict timelines while still setting and achieving realistic goals.

Keywords

Compliance and Security Standards; Payment Cards Industry; The Computer Misuse Act; The Police and Justice Act; The Human Rights Act; get out of jail free

Information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required