このブログを検索

2021年8月17日火曜日

The Art of Deception: Controlling the Human Element of SecurityPaperback – October 17, 2003

The Art of Deception: Controlling the Human Element of Security Paperback – October 17, 2003
Rating
Descriptions
N/A

N/A
Item Model
N/A
Technical Specification
Publisher‏: ‎Wiley; 1st edition (October 17, 2003)
Publication date‏: ‎October 17, 2003
Language‏: ‎English
Paperback‏: ‎368 pages
ISBN-10‏: ‎076454280X
ISBN-13‏: ‎978-0764542800
Dimensions‏: ‎6 x 1 x 9 inches
Byline
English Edition by Kevin D. Mitnick (著), William L. Simon (著), Steve Wozniak (はしがき) & 0 more
Merchant
Ships from RAREWAVES-JP Sold by RAREWAVES-JP
All Variant
N/A
Size Variations
N/A
Colour Variations
N/A
Variation Details
N/A
Review

この本は危険だ。だけど、面白い。
Reviewed in Japan on June 7, 2003

困難な状況に追い込まれたとき、人間は、誰も考えなかったような、とんでもないことを思いつく。本書に書かれている、ソーシャルエンジニアの犯行は、どれも、「よくこんなことを考えつくものだ」「なるほど、こんな手があったのか」と目から鱗が落ちる騙しの技術(Art of Deception)ばかりだ。読み物として、本当に面白い。「1ダースの複雑なミステリーのクライマックスの部分を次から次へと読むようなもの」と評されるのも納得できる。ただ、こうした、人間の負の想像力&創造力がもっと別の肯定的な方面に発揮できないか、と思うのは評者だけだろうか。

この本は危険だ。だけど、面白い。
Reviewed in Japan on June 7, 2003

困難な状況に追い込まれたとき、人間は、誰も考えなかったような、とんでもないことを思いつく。本書に書かれている、ソーシャルエンジニアの犯行は、どれも、「よくこんなことを考えつくものだ」「なるほど、こんな手があったのか」と目から鱗が落ちる騙しの技術(Art of Deception)ばかりだ。読み物として、本当に面白い。「1ダースの複雑なミステリーのクライマックスの部分を次から次へと読むようなもの」と評されるのも納得できる。ただ、こうした、人間の負の想像力&創造力がもっと別の肯定的な方面に発揮できないか、と思うのは評者だけだろうか。

世知辛い世の中で騙されないためにも
Reviewed in Japan on November 21, 2002

英語でかかれていることを忘れて一気に読んでしまった。とにかく面白い。いくらファイアウォールを導入し、IDSで監視し、セキュリティポリシーを制定しても、人間を騙せば崩壊してしまう、ということが著者の体験から生き生きと書かれている。詐欺関係の用語だけ押さえれば、文章自体は平易で読みやすい。ありきたりのソーシャルエンジニアリング(ごみ箱あさりなど)では満足できない人にお薦め。

世知辛い世の中で騙されないためにも
Reviewed in Japan on November 21, 2002

英語でかかれていることを忘れて一気に読んでしまった。とにかく面白い。いくらファイアウォールを導入し、IDSで監視し、セキュリティポリシーを制定しても、人間を騙せば崩壊してしまう、ということが著者の体験から生き生きと書かれている。詐欺関係の用語だけ押さえれば、文章自体は平易で読みやすい。ありきたりのソーシャルエンジニアリング(ごみ箱あさりなど)では満足できない人にお薦め。

quite a disappointment
Reviewed in Japan on January 19, 2003

Plain bad. The book is a compendum of anecdotal evidence, presented as "true stories" that makes the well-known point that a security policy is as good/bad as its worst element. Well, we knew that already.Each story is told twice, the second time being a superficial and elementary analysis - so one can skip about half the book without loss. Many factual errors, some of them quite telling about the author technology background - or the lack of it (an anonymous FTP account is called "a program", etc.).Overall, this book does not even remotely qualify as a book on security. It is shallow and trivial about social engineering, and has no useful information on the technology aspects of information security.As for its entertainment value - well - either one of Grisham, Chandler or Poe would make a much better reading.

quite a disappointment
Reviewed in Japan on January 19, 2003

Plain bad. The book is a compendum of anecdotal evidence, presented as "true stories" that makes the well-known point that a security policy is as good/bad as its worst element. Well, we knew that already.Each story is told twice, the second time being a superficial and elementary analysis - so one can skip about half the book without loss. Many factual errors, some of them quite telling about the author technology background - or the lack of it (an anonymous FTP account is called "a program", etc.).Overall, this book does not even remotely qualify as a book on security. It is shallow and trivial about social engineering, and has no useful information on the technology aspects of information security.As for its entertainment value - well - either one of Grisham, Chandler or Poe would make a much better reading.

N/A
Reviewed in the United Kingdom on October 9, 2012

Kevin Mitnick is well known to those in the security field; he is notorious for the efforts that he made to find ways around security systems, sometimes by hacking, but often by social engineering. I was a bit ambivalent about buying the book; did I want to "reward" someone that had been responsible for a number of security breaches.However, I am glad that I did; the book highlights the methods used to gain illegal access to sites, systems and processes. These can be used by the astute security professional to understand how hackers think and to than be able to consider their options for improving their own security.Security is not a destination, it is a journey. No matter how good a job you do, someone will find a way to get around the most hardened of processes. It is necessary to constantly question if the specific process that you have introduced are working and if they are doing the job that you think they should. Books like this reveal just how important it is to be able to take that outsider's view to ensure that you do not become one of the victims.It's a very readable book and I feel that it should be read by anyone involved at any level in the field of IT security.

N/A
Reviewed in the United Kingdom on October 9, 2012

Kevin Mitnick is well known to those in the security field; he is notorious for the efforts that he made to find ways around security systems, sometimes by hacking, but often by social engineering. I was a bit ambivalent about buying the book; did I want to "reward" someone that had been responsible for a number of security breaches.However, I am glad that I did; the book highlights the methods used to gain illegal access to sites, systems and processes. These can be used by the astute security professional to understand how hackers think and to than be able to consider their options for improving their own security.Security is not a destination, it is a journey. No matter how good a job you do, someone will find a way to get around the most hardened of processes. It is necessary to constantly question if the specific process that you have introduced are working and if they are doing the job that you think they should. Books like this reveal just how important it is to be able to take that outsider's view to ensure that you do not become one of the victims.It's a very readable book and I feel that it should be read by anyone involved at any level in the field of IT security.

N/A
Reviewed in the United Kingdom on November 16, 2011

( NB The author is Kevin Mitnick, despite Amazon's "all my reviews" showing it to be Steve Wozniak, Steve Jobs' partner in founding Apple. Woz merely wrote the foreword. )I found this book very disappointing. After listening to an interview with the author, I was interested in learning more about his hacker background, and techniques he used to gain access to computer systems. As his new book is so excessively priced, I settled for a used copy of this, his earlier book.At first it held my interest, as it describes how access to computer systems is gained by "social engineering" - posing as a company employee from one department, when phoning another department & extracting access infromation from employees like receptionists etc. who trust that you are genuine. It helps to be able to name drop managers' names too. He even persuades systems administrators to set him up with a "guest" account by posing as a visitor from another installation, within the same company.Fascinating in as far as it went, but that's where it stopped. Subsequent episodes were all variations on the same theme, and soon I got bored with reading the same stuff over and over again, especially as each episode was also followed by an analysis of how it was done (not needed really, it was self-evident) and then recommendations on how to avoid being compromised by this kind of hack. So all this was repeated time and time again also.The only time it raised a smile was when he talks about running a password harvesting program on a dumb terminal. This is a relatively simple hack which, as a college teacher of I.T. I was able to demonstrate to students on our Unix system, so the author brought back interesting memories.I have a lot of respect for his chutzpah and nerve in carrying through what he did, and also his skill in penetrating systems, but am far less impressed by his ability as a writer. The book is heading for the charity (thrift) shop.

N/A
Reviewed in the United Kingdom on November 16, 2011

( NB The author is Kevin Mitnick, despite Amazon's "all my reviews" showing it to be Steve Wozniak, Steve Jobs' partner in founding Apple. Woz merely wrote the foreword. )I found this book very disappointing. After listening to an interview with the author, I was interested in learning more about his hacker background, and techniques he used to gain access to computer systems. As his new book is so excessively priced, I settled for a used copy of this, his earlier book.At first it held my interest, as it describes how access to computer systems is gained by "social engineering" - posing as a company employee from one department, when phoning another department & extracting access infromation from employees like receptionists etc. who trust that you are genuine. It helps to be able to name drop managers' names too. He even persuades systems administrators to set him up with a "guest" account by posing as a visitor from another installation, within the same company.Fascinating in as far as it went, but that's where it stopped. Subsequent episodes were all variations on the same theme, and soon I got bored with reading the same stuff over and over again, especially as each episode was also followed by an analysis of how it was done (not needed really, it was self-evident) and then recommendations on how to avoid being compromised by this kind of hack. So all this was repeated time and time again also.The only time it raised a smile was when he talks about running a password harvesting program on a dumb terminal. This is a relatively simple hack which, as a college teacher of I.T. I was able to demonstrate to students on our Unix system, so the author brought back interesting memories.I have a lot of respect for his chutzpah and nerve in carrying through what he did, and also his skill in penetrating systems, but am far less impressed by his ability as a writer. The book is heading for the charity (thrift) shop.

N/A
Reviewed in the United Kingdom on June 29, 2015

I bought this having thoroughly enjoyed Mitnick's "Ghost in the Wires", but it fell short of the original standard. My overall impression was that this book simply capitalised on Mitnick's reputation based on his "notoriety" and his previous literary success. I found myself skipping large chunks of it, but maybe the book would be useful as a checklist or reminder for those who work directly with internet security issues. Mitnick's "Ghost in the Wires" taught me a lot; this one added little more.

N/A
Reviewed in the United Kingdom on June 29, 2015

I bought this having thoroughly enjoyed Mitnick's "Ghost in the Wires", but it fell short of the original standard. My overall impression was that this book simply capitalised on Mitnick's reputation based on his "notoriety" and his previous literary success. I found myself skipping large chunks of it, but maybe the book would be useful as a checklist or reminder for those who work directly with internet security issues. Mitnick's "Ghost in the Wires" taught me a lot; this one added little more.

N/A
Reviewed in the United Kingdom on June 21, 2016

I wasn't really sure what I was getting myself in for getting this book, but I have to say that I really enjoyed it.Kevin was what the movie's Hackers 1/2 was based on and this really does take you through his early life and how easy it was back then to get details of passwords and accounts etc. But also teaches of ways to counter also.Overall I really enjoyed the book and often mention it in conversation about how social engineering can be used.

N/A
Reviewed in the United Kingdom on June 21, 2016

I wasn't really sure what I was getting myself in for getting this book, but I have to say that I really enjoyed it.Kevin was what the movie's Hackers 1/2 was based on and this really does take you through his early life and how easy it was back then to get details of passwords and accounts etc. But also teaches of ways to counter also.Overall I really enjoyed the book and often mention it in conversation about how social engineering can be used.

N/A
Reviewed in the United Kingdom on November 9, 2019

Read this because I had previously read and enjoyed Ghost in the Wires. This was not quite as good in my opinion as it is not a story but more of a informative type book.

To tear each other with Yan Wang, deceiving brother is extremely selfish is the root cause
The mutual tears between King Guo and King Yan have been made public since July 14. Guo Wengui was on the sickbed and instructed the ants to divide their comrades into two groups and punish the thieve ...

To tear each other with Yan Wang, deceiving brother is extremely selfish is the root cause
The mutual tears between King Guo and King Yan have been made public since July 14. Guo Wengui was on the sickbed and instructed the ants to divide their comrades into two groups and punish the thieve ...

EU Govts. must listen to thousands of European citizens asking them to be actively involved ...
This blog is part of the debate blog series on the proposed treaty and its complementarity with the UN Guiding Principles. We believe that an inclusive and open debate is crucial to make sure these in ...

USA: Investigation highlights 'controlling and exploitative' conditions at Nicalis, incl ...
" Inside The Ghosting, Racism And Exploitation At Game Publisher Nicalis", 13 September 2019 … Ghosting stories…are common when it comes to Nicalis… Kotaku spoke to…extern ...

To tear each other with Yan Wang, deceiving brother is extremely selfish is the root cause
The mutual tears between King Guo and King Yan have been made public since July 14. Guo Wengui was on the sickbed and instructed the ants to divide their comrades into two groups and punish the thieve ...

EU Govts. must listen to thousands of European citizens asking them to be actively involved ...
This blog is part of the debate blog series on the proposed treaty and its complementarity with the UN Guiding Principles. We believe that an inclusive and open debate is crucial to make sure these in ...

USA: Investigation highlights 'controlling and exploitative' conditions at Nicalis, incl ...
" Inside The Ghosting, Racism And Exploitation At Game Publisher Nicalis", 13 September 2019 … Ghosting stories…are common when it comes to Nicalis… Kotaku spoke to…extern ...

USA: Hobby Lobby violated Illinois anti-bias law by denying transgender employee access to ...
"Hobby Lobby Loses Transgender Bathroom Access Case in Illinois", 14 Aug 2021 Hobby Lobby Stores Inc. violated Illinois anti-bias law by denying a transgender woman employee access to the women’s bath ...

レスターが冨安健洋の“ハイジャック”検討? フォファナ ...
レスター・シティが冨安健洋に関心を寄せるようだ。イギリス『テレグラフ』が伝えた。 2019年からプレーするボローニャで安定したパフォーマンスを披露して高評価を得る冨安。この活躍を受け、今夏の移籍市場でセリエAのライバルが興味を示す中、プレミアリーグの強豪トットナム行きが濃厚と頻繁に伝えられている。 しかし、プレミアリーグ勢による争奪戦はまだまだ終わりそうにない。トットナムのライバルであるアーセナル ...

異国の地・日本で、フリーランスとして働くイタリア人IT ...
AKB48の向井地美音がパーソナリティをつとめ、公認会計士の澤昭人から身近にある経済の仕組みをわかりやすく学んでいくTOKYO FMの番組「ジュグラーの波~澤と美音のまるっと経済学~」。7月29日(木)、8月5日(木)放送の「美音のまるっとエコノミー supported by PE-BANK」のコーナーでは、株式会社PE-BANKに所属するプロエンジニアのエルコリ・ミケーレさんを迎え、日本に興味を ...

Position paper on sustainable business with respect for human rights
Various reports show that Swedish companies do not do enough to ensure that human rights are respected in their supply chains. Human rights abuses continue to be a major problem i ...

To tear each other with Yan Wang, deceiving brother is extremely selfish is the root cause
The mutual tears between King Guo and King Yan have been made public since July 14. Guo Wengui was on the sickbed and instructed the ants to divide their comrades into two groups and punish the thieve ...

EU Govts. must listen to thousands of European citizens asking them to be actively involved ...
This blog is part of the debate blog series on the proposed treaty and its complementarity with the UN Guiding Principles. We believe that an inclusive and open debate is crucial to make sure these in ...

USA: Investigation highlights 'controlling and exploitative' conditions at Nicalis, incl ...
" Inside The Ghosting, Racism And Exploitation At Game Publisher Nicalis", 13 September 2019 … Ghosting stories…are common when it comes to Nicalis… Kotaku spoke to…extern ...

USA: Hobby Lobby violated Illinois anti-bias law by denying transgender employee access to ...
"Hobby Lobby Loses Transgender Bathroom Access Case in Illinois", 14 Aug 2021 Hobby Lobby Stores Inc. violated Illinois anti-bias law by denying a transgender woman employee access to the women’s bath ...

レスターが冨安健洋の“ハイジャック”検討? フォファナ ...
レスター・シティが冨安健洋に関心を寄せるようだ。イギリス『テレグラフ』が伝えた。 2019年からプレーするボローニャで安定したパフォーマンスを披露して高評価を得る冨安。この活躍を受け、今夏の移籍市場でセリエAのライバルが興味を示す中、プレミアリーグの強豪トットナム行きが濃厚と頻繁に伝えられている。 しかし、プレミアリーグ勢による争奪戦はまだまだ終わりそうにない。トットナムのライバルであるアーセナル ...

異国の地・日本で、フリーランスとして働くイタリア人IT ...
AKB48の向井地美音がパーソナリティをつとめ、公認会計士の澤昭人から身近にある経済の仕組みをわかりやすく学んでいくTOKYO FMの番組「ジュグラーの波~澤と美音のまるっと経済学~」。7月29日(木)、8月5日(木)放送の「美音のまるっとエコノミー supported by PE-BANK」のコーナーでは、株式会社PE-BANKに所属するプロエンジニアのエルコリ・ミケーレさんを迎え、日本に興味を ...

Position paper on sustainable business with respect for human rights
Various reports show that Swedish companies do not do enough to ensure that human rights are respected in their supply chains. Human rights abuses continue to be a major problem i ...

To tear each other with Yan Wang, deceiving brother is extremely selfish is the root cause
The mutual tears between King Guo and King Yan have been made public since July 14. Guo Wengui was on the sickbed and instructed the ants to divide their comrades into two groups and punish the thieve ...

EU Govts. must listen to thousands of European citizens asking them to be actively involved ...
This blog is part of the debate blog series on the proposed treaty and its complementarity with the UN Guiding Principles. We believe that an inclusive and open debate is crucial to make sure these in ...

USA: Investigation highlights 'controlling and exploitative' conditions at Nicalis, incl ...
" Inside The Ghosting, Racism And Exploitation At Game Publisher Nicalis", 13 September 2019 … Ghosting stories…are common when it comes to Nicalis… Kotaku spoke to…extern ...

USA: Hobby Lobby violated Illinois anti-bias law by denying transgender employee access to ...
"Hobby Lobby Loses Transgender Bathroom Access Case in Illinois", 14 Aug 2021 Hobby Lobby Stores Inc. violated Illinois anti-bias law by denying a transgender woman employee access to the women’s bath ...

レスターが冨安健洋の“ハイジャック”検討? フォファナ ...
レスター・シティが冨安健洋に関心を寄せるようだ。イギリス『テレグラフ』が伝えた。 2019年からプレーするボローニャで安定したパフォーマンスを披露して高評価を得る冨安。この活躍を受け、今夏の移籍市場でセリエAのライバルが興味を示す中、プレミアリーグの強豪トットナム行きが濃厚と頻繁に伝えられている。 しかし、プレミアリーグ勢による争奪戦はまだまだ終わりそうにない。トットナムのライバルであるアーセナル ...

異国の地・日本で、フリーランスとして働くイタリア人IT ...
AKB48の向井地美音がパーソナリティをつとめ、公認会計士の澤昭人から身近にある経済の仕組みをわかりやすく学んでいくTOKYO FMの番組「ジュグラーの波~澤と美音のまるっと経済学~」。7月29日(木)、8月5日(木)放送の「美音のまるっとエコノミー supported by PE-BANK」のコーナーでは、株式会社PE-BANKに所属するプロエンジニアのエルコリ・ミケーレさんを迎え、日本に興味を ...

Position paper on sustainable business with respect for human rights
Various reports show that Swedish companies do not do enough to ensure that human rights are respected in their supply chains. Human rights abuses continue to be a major problem i ...

To tear each other with Yan Wang, deceiving brother is extremely selfish is the root cause
The mutual tears between King Guo and King Yan have been made public since July 14. Guo Wengui was on the sickbed and instructed the ants to divide their comrades into two groups and punish the thieve ...

EU Govts. must listen to thousands of European citizens asking them to be actively involved ...
This blog is part of the debate blog series on the proposed treaty and its complementarity with the UN Guiding Principles. We believe that an inclusive and open debate is crucial to make sure these in ...

USA: Investigation highlights 'controlling and exploitative' conditions at Nicalis, incl ...
" Inside The Ghosting, Racism And Exploitation At Game Publisher Nicalis", 13 September 2019 … Ghosting stories…are common when it comes to Nicalis… Kotaku spoke to…extern ...

USA: Hobby Lobby violated Illinois anti-bias law by denying transgender employee access to ...
"Hobby Lobby Loses Transgender Bathroom Access Case in Illinois", 14 Aug 2021 Hobby Lobby Stores Inc. violated Illinois anti-bias law by denying a transgender woman employee access to the women’s bath ...

レスターが冨安健洋の“ハイジャック”検討? フォファナ ...
レスター・シティが冨安健洋に関心を寄せるようだ。イギリス『テレグラフ』が伝えた。 2019年からプレーするボローニャで安定したパフォーマンスを披露して高評価を得る冨安。この活躍を受け、今夏の移籍市場でセリエAのライバルが興味を示す中、プレミアリーグの強豪トットナム行きが濃厚と頻繁に伝えられている。 しかし、プレミアリーグ勢による争奪戦はまだまだ終わりそうにない。トットナムのライバルであるアーセナル ...

異国の地・日本で、フリーランスとして働くイタリア人IT ...
AKB48の向井地美音がパーソナリティをつとめ、公認会計士の澤昭人から身近にある経済の仕組みをわかりやすく学んでいくTOKYO FMの番組「ジュグラーの波~澤と美音のまるっと経済学~」。7月29日(木)、8月5日(木)放送の「美音のまるっとエコノミー supported by PE-BANK」のコーナーでは、株式会社PE-BANKに所属するプロエンジニアのエルコリ・ミケーレさんを迎え、日本に興味を ...

Position paper on sustainable business with respect for human rights
Various reports show that Swedish companies do not do enough to ensure that human rights are respected in their supply chains. Human rights abuses continue to be a major problem i ...

【みんな生きている】横田めぐみさん[横浜市・写真展1]/NTV〈埼玉〉
《インチキ遺骨ではなくて、拉致被害者を返せ!拉致被害者・横田めぐみさんの写真展始まる》 北朝鮮による拉致被害者・横田めぐみさんの写真展が8月13日から始まりました。 写真展では、めぐみさんと家族の写真や、初公開の書き初め作品等98点が展示されています。 訪れた母の早紀江さんは懐かしそうに写真を見つめ、娘との再会へ向けた決意を語りました。 「(写真を見ると)全部が思い出される。必ず解決して、みんなが ...

【みんな生きている】横田めぐみさん[横浜市・写真展1]/KTK
《インチキ遺骨ではなくて、拉致被害者を返せ!拉致被害者・横田めぐみさんの写真展始まる》 北朝鮮による拉致被害者・横田めぐみさんの写真展が8月13日から始まりました。 写真展では、めぐみさんと家族の写真や、初公開の書き初め作品等98点が展示されています。 訪れた母の早紀江さんは懐かしそうに写真を見つめ、娘との再会へ向けた決意を語りました。 「(写真を見ると)全部が思い出される。必ず解決して、みんなが ...