Unauthorised Access: Physical Penetration Testing For IT Security Teams (Paperback)
暫譯: 未經授權的訪問:IT安全團隊的實體滲透測試
Wil Allsopp
- 出版商: Wiley
- 出版日期: 2009-10-01
- 定價: $1,900
- 售價: 8.0 折 $1,520
- 語言: 英文
- 頁數: 308
- 裝訂: Paperback
- ISBN: 0470747617
- ISBN-13: 9780470747612
-
相關分類:
Penetration-test、資訊安全
立即出貨 (庫存 < 4)
商品描述
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.
Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.
- Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance
- Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels
- Includes safeguards for consultants paid to probe facilities unbeknown to staff
- Covers preparing the report and presenting it to management
In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.
商品描述(中文翻譯)
計劃和執行電腦安全的實體滲透測試的首本指南
大多數IT安全團隊專注於保護網絡和系統免受外部攻擊,但如果攻擊者在內部呢?雖然幾乎所有IT團隊都執行各種網絡和應用滲透測試程序,但對於實體位置的審核和測試卻並不普遍。IT團隊現在越來越多地要求進行實體滲透測試,但在培訓方面的資源卻很少。這項測試的目標是展示在實體安全方面的操作程序中的任何缺陷。
本書由世界知名駭客Kevin D. Mitnick撰寫的前言,以及《入侵的藝術》(The Art of Intrusion)和《欺騙的藝術》(The Art of Deception)的首位作者,這是計劃和執行實體滲透測試的首本指南。在書中,IT安全專家Wil Allsopp將引導您完成整個過程,從收集情報、進入內部、應對威脅、保持隱藏(通常是在明處)到獲取網絡和數據的訪問權限。
- 教導IT安全團隊如何闖入自己的設施,以防範此類攻擊,這通常被IT安全團隊忽視,但卻至關重要
- 處理情報收集,例如獲取建築藍圖和衛星影像、駭入安全攝影機、安裝竊聽器和竊聽安全頻道
- 包括為未告知員工的顧問進行設施探查的安全措施
- 涵蓋準備報告並向管理層呈現的過程
為了保護數據,您需要像小偷一樣思考——讓《未經授權的訪問》(Unauthorized Access)告訴您如何進入。