19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In this part . . .<br />

L et the games begin! You’ve waited long enough —<br />

now’s the time to start testing your systems. But<br />

where do you start? How about with your three Ps — your<br />

people, your physical systems, and your passwords?<br />

These are, after all, three of the most easily and commonly<br />

attacked targets in your organization.<br />

This part starts with a discussion of hacking people (as<br />

opposed to hacking up people; this is social engineering,<br />

not The Texas Chainsaw Massacre). It then goes on to look<br />

at physical security vulnerabilities. Of course, I’d be<br />

remiss in a part about people if I skipped passwords, so I<br />

cover the technical details of testing those as well. This is<br />

a great way to get the ball rolling to warm you up for the<br />

more specific hacks later in the book.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!