
Unauthorised access: physical penetration testing for iIT security teams
Allsopp, Wil
You have performed vulnerability and pen testing at the application level. You have implemented network security best practices, keep all systems patched and updated, and run regular network penetration tests. Firewalls are in place,wireless access points are secured. So, your network and precious data is safe, right? Wrong. Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside. But what if your attacker was on theinside? What if they were inside your building sitting at an employee's computer, or hidden in a wiring closet or even sitting inside your server room? Unauthorised Access provides the first guide to planning and performing a physical penetration test. Inside, IT security expert Will Alsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight) and getting access to networks and data. Learn to think like an attacker with topics that include: Complying with local law UK/EU/US Types of Target vs. Level of Anticipated Response. Dealing with guards Accessing building blueprints, satellite imagery and other intelligence Planting bugs, covert wireless access points Hacking security cameras. Eavesdropping on security channels. Defeating locks, electronic keypads andother electronic access systems Social engineering - the weakest link Using your Get Out of Jail Free Card Preparing the report and presenting to management and more
- ISBN: 978-0-470-74761-2
- Editorial: John Wiley & Sons
- Encuadernacion: Rústica
- Páginas: 304
- Fecha Publicación: 07/08/2009
- Nº Volúmenes: 1
- Idioma: Inglés