O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Ensuring Value Through Effective Threat Modeling

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

Most customers realize that they need Social Engineering, but often set unrealistic targets. This chapter helps you to steer customers away from the Mission Impossible mentality and toward more practical objectives. Practical Social Engineering is less about dropping down nuclear cooling towers on ropes while avoiding lasers, and more about delivering value by identifying risks, even where time constraints tie one hand behind your back.

Keywords

Threat modeling; Information Assurance; Risk Management process; reconnaissance and surveillance; phishing; spear phishing; organized crime groups

Information in this chapter

• 

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required