Corporate Insecurity

Corporate Insecurity : True Stories of Corporate Espionage and Network Infiltration

By (author) 

List price: US$26.99

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

Description

A shocking tell-all look at corporate security, from a white-hat hacker who's spent years breaking into banks, insurers, and hospitals!



If you assume that the businesses you deal with are looking after your data securely, you're in for a shock. Companies are only as secure as their weakest link - this book shows just how weak this link can be.



Corporate Insecurity details frightening tales of corporate espionage that have never been told before. It includes from-the-trenches advice on making safe security holes: from technical issues to training, physical layouts to security mindsets. Written by Jim Stickley, one of the world's most well-known experts on corporate security and identity theft.
show more

Product details

  • Paperback | 320 pages
  • 178 x 232mm
  • Que Corporation,U.S.
  • United States
  • English
  • 0789739879
  • 9780789739872

Table of contents

Part I: Breaking in While They Watch

1. The Fire Inspector at a bank
2. The Russian Diplomat at a government facility
3. The Pest Inspector at a credit union
4. The Air Conditioning Technician at the Lottery
5. The Cube Consultant at a mortgage company
6. The Reporter with Camera Man at a law office
7. The OSHA Inspector at a bank
8. The Hired Consultant (When a small amount of access turned into a large amount)
9. When jobs go wrong. (Walk through the story where an engineer was arrested while performing the attack)

Part II: Gaining Confidential Information While Hidden in the Shadows

10. The Hallmark Greeting card and other "friendly email" attacks
11. The Free Keyboard. When free comes with a serious price
12. Using corporate email to gain confidential information
13. The Billboard takeover (How we took over an electronic billboard system giving access to post our own information on boards throughout the world.)
14. Hotel business centers and conference Internet cafes, the hackers home away from home
15. Wireless access points and the unseen risks (This chapter will cover not only the risks found in hotels but also when employees use wireless to bypass internal corporate security)
16. Social networking and the many risks
17. When ATM's become Automated Thieving Machines
18. Using music CD's to access personal computers
19. Phishing, Vishing and Smishing, understanding how these attacks work from inside out
show more

About Jim Stickley

Jim Stickley, CTO and VP of Engineering for TraceSecurity, is an internationally renowned security expert. He directs TraceSecurity's company strategy. Stickley has been showcased on NBC Nightly News, CNN NewsNight, CNBC's and NBC's Today Show, and quoted in Time, BusinessWeek, Fortune, and The New York Times amongst others. He is author of The Truth About Identity Theft.
show more