Wil Allsopp: Unauthorised Access: Physical Penetration Testing for IT Security Teams (2009)

24 August 2011, dusan

The first guide to planning and performing a physical penetration test on your computer’s security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.

Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.

– Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance
– Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels
– Includes safeguards for consultants paid to probe facilities unbeknown to staff
– Covers preparing the report and presenting it to management

In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.

Publisher John Wiley and Sons, 2009
ISBN 0470747617, 9780470747612
302 pages

publisher
google books

PDF

Peter Ludlow (ed.): Crypto Anarchy, Cyberstates, and Pirate Utopias (2001)

1 March 2009, pht

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence of governance structures within online communities and the visions of political sovereignty shaping some of those communities. Ludlow virtual communities as laboratories for conducting experiments in the construction of new societies and governance structures. While many online experiments will fail, Ludlow argues that given the synergy of the online world, new and superior governance structures may emerge. Indeed, utopian visions are not out of place, provided that we understand the new utopias to be fleeting localized “islands in the Net” and not permanent institutions.

The book is organized in five sections. The first section considers the sovereignty of the Internet. The second section asks how widespread access to resources such as Pretty Good Privacy and anonymous remailers allows the possibility of “Crypto Anarchy”—essentially carving out space for activities that lie outside the purview of nation states and other traditional powers. The third section shows how the growth of e-commerce is raising questions of legal jurisdiction and taxation for which the geographic boundaries of nation-states are obsolete. The fourth section looks at specific experimental governance structures evolved by online communities. The fifth section considers utopian and anti-utopian visions for cyberspace.

Contributors: Richard Barbrook, John Perry Barlow, William E. Baugh Jr., David S. Bennahum, Hakim Bey, David Brin, Andy Cameron, Dorothy E. Denning, Mark Dery, Kevin Doyle, Duncan Frissell, Eric Hughes, Karrie Jacobs, David Johnson, Peter Ludlow, Timothy C. May, Jennifer L. Mnookin, Nathan Newman, David G. Post, Jedediah S. Purdy, Charles J. Stivale.

Published by MIT Press, 2001
ISBN 0262621517, 9780262621519
485 pages

publisher
google books

PDF (updated on 2012-8-5)