Back to Results
First PageMeta Content
National security / Technology / Social engineering / Kevin Mitnick / Information security / Hacker / Social Security / The Art of Deception / Phreaking / Security / Computing / Crime prevention


Scanned by kineticstomp THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon
Add to Reading List

Document Date: 2012-10-01 20:14:08


Open Document

File Size: 1,28 MB

Share Result on Facebook

City

San Francisco / Austin / Washington / D.C. / New York / Victoria / Los Angeles / L.A. / /

Company

MCI / Wozchod Handels Bank of Zurich / Security Pacific National Bank / Schenectady Mutual Investments / IBM / Parkhurst Travel / This Swiss Bank / Thousand Oaks / Wells Fargo / National Bank / Merchant ID / ABUSE OF TRUST / First Call / Irving Trust Company / /

Continent

America / /

Country

Switzerland / United States / /

Currency

USD / /

Event

Person Communication and Meetings / Person Travel / M&A / /

Facility

Building Trust Chapter / Bar Chapter / Computer Learning Center / What building / /

IndustryTerm

security technology safeguards / bank account / intrusion detection systems / software technology / telephone network / media-created myth / regular systems / security technologies / resilient computer systems / software libertarian / bank / telephone / information technology / telephone industry / company intranet site / company work product / poker chip / encryption technology / downloaded software / bank personnel / board systems / defensive computing / stuffy banking system / metal detectors / egalitarian banking world / bank robbery / security technology / telephone switch / security products / media reports / bank officers / travel arrangements / company software products / information-security solutions / telephone company switch / authentication devices / corporate network / electronics / stronger authentication devices / early computer systems / phone systems / technology problem / facial recognition systems / recommended security product / telecommunications devices / electronic commerce / /

NaturalFeature

San Fernando Valley / /

Organization

Intruder Alert Chapter / Computer Learning Center in Los Angeles / Training Chapter / Third United Credit Union of Chicago / Clever Cons Chapter / Information Security Department / Using Sympathy / Guilt and Intimidation Chapter / National Science Foundation / Congress / Attacker Chapter / Combining Technology and Social Engineering Chapter / National Guard / Information Security Awareness and Training Chapter / Scenes Chapter / Bar Chapter / Computer Security Institute / Department of Defense / Entry-Level Employee Chapter / Building Trust Chapter / Phony Sites and Dangerous Attachments Chapter / Mechanized Line Assignment Center / /

Person

mark day / Chickie Leventhal / Oscar Grace / Alan Mitnick / Peter Abel / Adam Mitnick / Peter Abels / Lieberman / Richard Stallman / Some / Thompson / Mike Hansen / Kim Andrews / Mitchell Mitnick / Shelly Jaffe / Steve Wozniak For Reba Vartanian / Stanley Mark Rifkin / KEVIN D. MITNICK / Albert Einstein / William L. Simon / L. Simon Foreword / Steve Wozniak / Bill Simon / Paul Anthony / Henry McKinsey / Jack Biello For Arynne / Bruce Schneier / Chris Talbert / /

/

Position

guard / clerk / private investigator / budget analyst / ENGINEER / noted security consultant / social engineer / halfway-competent social engineer / author / contractor / CEO / second clerk / computer manager / skilled social engineer / respected scientist / receptionist / representative / first bank clerk / divorce lawyer / unscrupulous magician / movie writer / experienced social engineer / manager / movie writer / and everybody opens up / fictional contractor / co-author / consultant / first clerk / con artist / skillful social engineer / cable splicer / budget analyst for the department / friendly driver / Operations Center manager / waitress / writer / chair / board chairman / bank consultant / lawyer / /

ProvinceOrState

Texas / /

Technology

software technology / information technology / operating system / security technologies / poker chip / 11 Combining Technology / encryption technology / security technology / cell phones / facial recognition / ATM / operating systems / firewall / bulletin board systems / class of service / /

SocialTag