Confessions of a CIA Spy
The Art of Human Hacking
Falha ao colocar no Carrinho.
Falha ao adicionar à Lista de Desejos.
Falha ao remover da Lista de Desejos
Falha ao adicionar à Biblioteca
Falha ao seguir podcast
Falha ao parar de seguir podcast
Assine e ganhe 30% de desconto neste título
R$ 19,90 /mês
Compre agora por R$ 38,99
Nenhum método de pagamento padrão foi selecionado.
Pedimos desculpas. Não podemos vender este produto com o método de pagamento selecionado
-
Narrado por:
-
Gary Williams
-
De:
-
Peter Warmka
Sobre este áudio
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they’re high-profile individuals or entire organizations.
His illustrative examples reveal:
- The motivations and objectives behind attempted breaches by foreign intelligence services, criminal groups, industrial competitors, activists, and other threat actors
- How social media and carefully crafted insights into a victim’s motivations and vulnerabilities are leveraged during phishing, smishing, vishing, and other advanced social engineering operations to obtain even closely held information
- The psychology behind why humans are so susceptible to social engineering and how influence techniques are used to circumvent established security protocols
- How spies and other social engineers use elicitation to legally procure protected information from victims who often have no idea they’re being used
Whether you want to learn more about the intricate methods threat actors can use to access sensitive information on your organization or want to be able to spot the ways a social engineer might manipulate you in person or online, this book will change the way you think about that innocuous emails in your inbox or that unusual interaction with an eager stranger.
Following his CIA career, Peter founded the Counterintelligence Institute in order to transform the way individuals and their organizations assess the control they have over their own security. The insights detailed in this book have led clients to prioritize proactive measures in breach prevention over the more costly reactive measures following a preventable breach.
©2021 Peter Warmka (P)2021 Peter Warmka