From the Publisher:
Kevin Mitnick's exploits as a cyber-desperado and fugitive from one of the most exhaustive FBI manhunts in history have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison in 2000, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most famous hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Inviting you into the complex mind of the hacker, Mitnick provides realistic scenarios of cons, swindles, and social engineering attacks on businesses -- and the consequences. Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. He illustrates just how susceptible even the most locked-down information systems are to a determined con artist impersonating an IRS agent or any other seemingly innocent character. Narrated from the points of view of both the attacker and the victim, The Art of Deception explores why each attack was so successful -- and how it could have been averted -- in an engaging and highly readable manner reminiscent of a true-crime novel.
Most importantly, Mitnick redeems his former life of crime by providing specific guidelines for developing protocols, training programs, and manuals to ensure that a company's sophisticated technical security investment will not be for naught. He shares his advice for preventing security vulnerability in the hope that people will be mindfully on guard for an attack from the gravest risk of all -- human nature.
Cited By
- Baldry M, Happa J, Steed A, Smith S and Glencross M (2024). From Embodied Abuse to Mass Disruption: Generative, Inter-Reality Threats in Social, Mixed-Reality Platforms, Digital Threats: Research and Practice, 5:4, (1-36), Online publication date: 31-Dec-2025.
- Burda P, Allodi L and Zannone N (2024). Cognition in Social Engineering Empirical Research: A Systematic Literature Review, ACM Transactions on Computer-Human Interaction, 31:2, (1-55), Online publication date: 30-Apr-2024.
- Li T, Song C and Pang Q (2023). Defending against social engineering attacks, IET Information Security, 17:4, (703-726), Online publication date: 24-Jul-2023.
- Elleh F (2022). Cyber Security and COVID-19, International Journal of Systems and Software Security and Protection, 13:1, (1-14), Online publication date: 30-Dec-2022.
- Harris I, Derakhshan A and Carlsson M A Study of Targeted Telephone Scams Involving Live Attackers Socio-Technical Aspects in Security and Trust, (63-82)
- Kawase R, Diana F, Czeladka M, Schüler M and Faust M Internet Fraud Proceedings of the 30th ACM Conference on Hypertext and Social Media, (181-190)
- Wu Y, Fong S and Zhuang Y General Precautions against Security Threats for Computer Networks in SMEs Proceedings of the International Conference on Big Data and Internet of Thing, (134-140)
- Fernandes D, Freire M, Fazendeiro P and Incio P (2017). Applications of artificial immune systems to computer security, Journal of Information Security and Applications, 35:C, (138-159), Online publication date: 1-Aug-2017.
- Meffert C, Baggili I and Breitinger F (2016). Deleting collected digital evidence by exploiting a widely adopted hardware write blocker, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 18:S, (S87-S96), Online publication date: 7-Aug-2016.
- Jaafor O and Birregah B Multi-layered graph-based model for social engineering vulnerability assessment Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (1480-1488)
- Herley C (2014). Security, cybercrime, and scale, Communications of the ACM, 57:9, (64-71), Online publication date: 1-Sep-2014.
- Holzer A, Garbinato B and Vessaz F Middleware for location privacy Proceedings of the 2012 ACM Research in Applied Computation Symposium, (296-303)
- Kim D, Dunphy P, Briggs P, Hook J, Nicholson J, Nicholson J and Olivier P Multi-touch authentication on tabletops Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1093-1102)
- Kostakos V Human-in-the-loop CHI '08 Extended Abstracts on Human Factors in Computing Systems, (3075-3080)
- Gonzalez J, Sarriegi J and Gurrutxaga A A framework for conceptualizing social engineering attacks Proceedings of the First international conference on Critical Information Infrastructures Security, (79-90)
- Flechais I, Riegelsberger J and Sasse M Divide and conquer Proceedings of the 2005 workshop on New security paradigms, (33-41)
Index Terms
- The Art of Deception: Controlling the Human Element of Security