|Amazon Price||New from||Used from|
After Mitnick's first dozen examples anyone responsible for organizational security is going to lose the will to live. It's been said before, but people and security are antithetical. Organizations exist to provide a good or service and want helpful, friendly employees to promote the good or service. People are social animals who want to be liked. Controlling the human aspects of security means denying someone something. This circle can't be squared.
Considering Mitnick's reputation as a hacker guru, it's ironic that the last point of attack for hackers using social engineering are computers. Most of the scenarios in The Art of Deception work just as well against computer-free organizations and were probably known to the Phoenicians; technology simply makes it all easier. Phones are faster than letters, after all, and having large organizations means dealing with lots of strangers.
Much of Mitnick's security advice sounds practical until you think about implementation, when you realize that more effective security means reducing organizational efficiency--an impossible trade in competitive business. And anyway, who wants to work in an organization where the rule is "Trust no one"? Mitnick shows how easily security is breached by trust, but without trust people can't live and work together. In the real world, effective organizations have to acknowledge that total security is a chimera--and carry more insurance. --Steve Patient, amazon.co.uk --This text refers to the Hardcover edition.
If you are serious about REAL computer security that is effective, you must read this book.
Not only is the information really valuable -- it's a very good, fast paced read with as much suspense as you'd get from most mystery books.
It's truly amazing how effective Social Engineering can be against security systems of any kind.
This book is just a list of unrealistic scenarios. Anyone who works in a highly secured environment will find it practically useless. Read morePublished 1 month ago by Finnian Cornelison
Decent organization of material. Good use of examples. End starts to drag as you realize he is repeating himself and running out of ideas.Published 1 month ago by gets boring quick
This books is more story oriented than technical. It has a lot of great examples and some discussion but is not technically oriented in any way.Published 3 months ago by Buddy
I like this book, is very mind opening, makes you aware of simple tricks that social engineers use to gain access to your information. Read morePublished 5 months ago by Hector Monsivais
Picked up this one to read about Social Engineering from a guy who used to wear a black hat. since it was written over 12 years ago, some of the technical stuff is not quite... Read morePublished 5 months ago by Godzilla
This book highlights how security these days has little to do with electronics and more to do with employees and people in general. Read morePublished 7 months ago by funman1
A bit disappointed with this book to be truthful. Partly my own fault for expecting a book written in 2003 to be relevant and to be fair some of the cons and tricks were... Read morePublished 7 months ago by Tapper
The reason for security professionals to read this book can be summed up in two words: Eric Snowden. Read morePublished 7 months ago by David Lustig