Social engineering : : how crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication / / Robert W. Gehl and Sean T. Lawson.
"From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception to gain access to sensitive information"--
Saved in:
Superior document: | The MIT Press |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
Place / Publishing House: | Cambridge : : The MIT Press,, [2022] |
Year of Publication: | 2022 |
Edition: | 1st ed. |
Language: | English |
Series: | The MIT Press Series
|
Physical Description: | 1 online resource (xi, 328 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 04864nam a2200601Ki 4500 | ||
---|---|---|---|
001 | 993544410004498 | ||
005 | 20240313184117.0 | ||
006 | m o d | ||
007 | cr#cnu|||||||| | ||
008 | 211130s2022 mau ob 001 0 eng d | ||
020 | |a 0-262-36892-7 | ||
020 | |a 0-262-36893-5 | ||
035 | |a (CKB)4900000001020026 | ||
035 | |a (MiAaPQ)EBC6888218 | ||
035 | |a (Au-PeEL)EBL6888218 | ||
035 | |a (OCoLC)1286684156 | ||
035 | |a (oapen)https://directory.doabooks.org/handle/20.500.12854/84609 | ||
035 | |a (MiAaPQ)EBC30536284 | ||
035 | |a (Au-PeEL)EBL30536284 | ||
035 | |a (OCoLC-P)1286684156 | ||
035 | |a (MaCbMITP)12984 | ||
035 | |a (EXLCZ)994900000001020026 | ||
040 | |a OCoLC-P |b eng |e rda |e pn |c OCoLC-P | ||
041 | 0 | |a eng | |
050 | 4 | |a HM742 |b .G45 2022eb | |
082 | 0 | 4 | |a 364.16/3 |2 23 |
100 | 1 | |a Gehl, Robert W., |e author. | |
245 | 1 | 0 | |a Social engineering : |b how crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication / |c Robert W. Gehl and Sean T. Lawson. |
246 | 3 | 0 | |a How crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication |
250 | |a 1st ed. | ||
264 | 1 | |a Cambridge : |b The MIT Press, |c [2022] | |
300 | |a 1 online resource (xi, 328 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The MIT Press | |
546 | |a English | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction: The Emergence of Masspersonal Social Engineering -- Why "Social Engineering" Is a Good Label -- On Social Engineering -- On Masspersonal Communication -- Masspersonal Social Engineering -- Plan of the Book -- I Engineering the Social -- 1 Crowdmasters: The Rise and Fall of Mass Social Engineering, 1920-1976 -- Engineering Society -- Social Reformers -- Managerialist Social Engineers -- Public Relations and the Mass Social Engineers -- "Social Engineering" Becomes a Pejorative -- Conclusion -- 2 Phreaks and Hackers: The Rise of Interpersonal Social Engineering, 1976-Present -- Intellectual Roots of Hacker Social Engineering -- The Phone Phreaks -- Phreaking and Hacking via Social Engineering -- Hacker Social Engineering as Interpersonal Communication -- Relating Mass and Interpersonal Social Engineering -- Conclusion -- II The Social Engineering Process -- 3 Trashing: From Dumpster Diving to Data Dumps -- What Makes Social Engineering Trashing Possible? -- Making a Trash Society: Sanitary Engineering and Mass Social Engineering -- A Philosophy of Garbage -- In the Dumpster -- The Digital Dumpster -- Trashing in the Digital Dumpster -- Conclusion: Surveys, Dumpster Diving, and OSINT -- 4 Pretexting: Recognizing the Mitnick Mythology -- Hacker Pretexting -- Mass Social Engineering Pretexts -- The "World's Most Famous Hacker" -- Theories of Identity Play -- Recognizing Mitnick's Pretexting Successes: Structural Factors -- Social Engineering and Stereotyping -- Conclusion -- 5 Bullshitting: Deception, Friendliness, and Accuracy -- On Bullshit with the Phone Phreaks -- Bullshitting the Operator: Best Practices -- Bullshitting in Hacker Social Engineering -- Bullshit among the Mass Social Engineers -- Conclusion -- 6 Penetrating: The Desire to Control Media and Minds. | |
505 | 8 | |a Interpersonal Penetration Metaphor: Sexual Conquest -- Professional Penetration -- Mass Social Engineering Metaphors: Bullets -- Media Penetration by the Numbers -- Penetrating Us for Our Own Good? -- Conclusion -- III Masspersonal Social Engineering -- 7 Contemporary Masspersonal Social Engineering -- The Social Engineering Process -- Masspersonal Social Engineering Cases: Russia and Cambridge Analytica -- Masspersonal Social Engineering since 2016 -- Conclusion -- 8 Conclusion: Ameliorating Masspersonal Social Engineering -- Is Masspersonal Social Engineering Effective? -- Can Masspersonal Social Engineering Be Ethical? -- What to Do about Masspersonal Social Engineering? | |
520 | |a "From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception to gain access to sensitive information"-- |c Provided by publisher. | ||
588 | |a OCLC-licensed vendor bibliographic record and online resource. | ||
650 | 0 | |a Social media |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Internet fraud. | |
650 | 0 | |a Social engineering. | |
653 | |a COMPUTERS / Security / General | ||
653 | |a TECHNOLOGY & ENGINEERING / History | ||
653 | |a SOCIAL SCIENCE / Criminology | ||
776 | 0 | 8 | |z 0-262-54345-1 |
776 | 0 | 8 | |i Print version: |a Gehl, Robert W. |t Social engineering. |d Cambridge : The MIT Press, 2022 |z 9780262543453 |w (DLC) 2021016750 |w (OCoLC)1250432879 |
700 | 1 | |a Lawson, Sean T., |d 1977- |e author. | |
830 | 4 | |a The MIT Press Series | |
906 | |a BOOK | ||
ADM | |b 2024-03-14 05:57:15 Europe/Vienna |d 00 |f system |c marc21 |a 2022-03-05 21:45:23 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337585510004498&Force_direct=true |Z 5337585510004498 |b Available |8 5337585510004498 |