Cargando…

Phishing and communication channels a guide to identifying and mitigating phishing attacks /

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usern...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sonowal, Gunikhan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [United States] : Apress, 2022.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_on1288274354
003 OCoLC
005 20231017213018.0
006 m o d
007 cr un|---aucuu
008 211212s2022 xxu ob 001 0 eng d
040 |a YDX  |b eng  |c YDX  |d EBLCP  |d TOH  |d ORMDA  |d OCLCO  |d OCLCF  |d GW5XE  |d OCLCO  |d N$T  |d OCLCQ 
019 |a 1288169949  |a 1288193759  |a 1289372561 
020 |a 9781484277447  |q (electronic bk.) 
020 |a 1484277449  |q (electronic bk.) 
020 |z 1484277430 
020 |z 9781484277430 
024 7 |a 10.1007/978-1-4842-7744-7  |2 doi 
029 1 |a AU@  |b 000070394904 
029 1 |a AU@  |b 000070439436 
035 |a (OCoLC)1288274354  |z (OCoLC)1288169949  |z (OCoLC)1288193759  |z (OCoLC)1289372561 
037 |a 9781484277447  |b O'Reilly Media 
050 4 |a HV6773 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 364.1632  |2 23 
049 |a UAMI 
100 1 |a Sonowal, Gunikhan. 
245 1 0 |a Phishing and communication channels  |h [electronic resource] :  |b a guide to identifying and mitigating phishing attacks /  |c Gunikhan Sonowal. 
260 |a [United States] :  |b Apress,  |c 2022. 
300 |a 1 online resource 
520 |a Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks. What You Will Learn Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness Be aware of the techniques that attackers most commonly use to request information Master the best solutions (including educational, legal, technical) to protect against phishing attacks Who This Book Is For Security professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. The secondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity. 
505 0 |a 1: Introduction to Phishing -- 2: Types of Phishing -- 3: Communication Channels -- 4: What Does a Phishing URL Look Like? -- 5: Characteristics of a Phishing Website -- 6: Phishing Kits -- 7: Training Methods for Phishing Detection -- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws -- 9: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep Learning Algorithms -- Appendix C: Natural Language Processing (NLP) -- Appendix D: Evaluation Metrics for Phishing Detection Approaches. 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed February 11, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Phishing  |x Prevention. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
776 0 8 |i Print version:  |z 1484277430  |z 9781484277430  |w (OCoLC)1266896348 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484277447/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 302631678 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6824253 
938 |a EBSCOhost  |b EBSC  |n 3117636 
994 |a 92  |b IZTAP