記錄 3 之 3
Record:   Prev Next
作者 Hadnagy, Christopher
書名 Phishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails
出版項 Somerset : John Wiley & Sons, Incorporated, 2015
©2015
國際標準書號 9781118958490 (electronic bk.)
9781118958476
book jacket
版本 1st ed
說明 1 online resource (227 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
附註 Cover -- Title Page -- Copyright -- Contents -- Chapter 1 An Introduction to the Wild World of Phishing -- Phishing 101 -- How People Phish -- Examples -- High-Profile Breaches -- Phish in Their Natural Habitat -- Phish with Bigger Teeth -- Spear Phishing -- Summary -- Chapter 2 The Psychological Principles of Decision-Making -- Decision-Making: Small Bits -- Cognitive Bias -- Physiological States -- External Factors -- The Bottom Line About Decision-Making -- It Seemed Like a Good Idea at the Time -- How Phishers Bait the Hook -- Introducing the Amygdala -- The Guild of Hijacked Amygdalas -- Putting a Leash on the Amygdala -- Wash, Rinse, Repeat -- Summary -- Chapter 3 Influence and Manipulation -- Why the Difference Matters to Us -- How Do I Tell the Difference? -- How Will We Build Rapport with Our Targets? -- How Will Our Targets Feel After They Discover They've Been Tested? -- What Is Our Intent? -- But the Bad Guys Will Use Manipulation . . . -- Lies, All Lies -- P Is for Punishment -- Principles of Influence -- Reciprocity -- Obligation -- Concession -- Scarcity -- Authority -- Consistency and Commitment -- Liking -- Social Proof -- More Fun with Influence -- Our Social Nature -- Physiological Response -- Psychological Response -- Things to Know About Manipulation -- Summary -- Chapter 4 Lessons in Protection -- Lesson One: Critical Thinking -- How Can Attackers Bypass This Method? -- Lesson Two: Learn to Hover -- What If I Already Clicked the Link and I Think It's Dangerous? -- How Can Attackers Bypass This Method? -- Lesson Three: URL Deciphering -- How Can Attackers Bypass This Method? -- Lesson Four: Analyzing E-mail Headers -- How Can Attackers Bypass This Method? -- Lesson Five: Sandboxing -- How Can Attackers Bypass This Method? -- The "Wall of Sheep," or a Net of Bad Ideas -- Copy and Paste Your Troubles Away -- Sharing Is Caring
My Mobile Is Secure -- A Good Antivirus Program Will Save You -- Summary -- Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program -- The Basic Recipe -- Why? -- What's the Theme? -- The Big, Fat, Not-So-Legal Section -- Developing the Program -- Setting a Baseline -- Setting the Difficulty Level -- Writing the Phish -- Tracking and Statistics -- Reporting -- Phish, Educate, Repeat -- Summary -- Chapter 6 The Good, the Bad, and the Ugly: Policies and More -- Oh, the Feels: Emotion and Policies -- The Definition -- The Bad -- Making It "Good" -- The Boss Is Exempt -- The Definition -- The Bad -- Making It "Good" -- I'll Just Patch One of the Holes -- The Definition -- The Bad -- Making It "Good" -- Phish Just Enough to Hate It -- The Definition -- The Bad -- Making It "Good" -- If You Spot a Phish, Call This Number -- The Definition -- The Bad -- Making It "Good" -- The Bad Guys Take Mondays Off -- The Definition -- The Bad -- Making It "Good" -- If You Can't See It, You Are Safe -- The Definition -- The Bad -- Making It "Good" -- The Lesson for Us All -- Summary -- Chapter 7 The Professional Phisher's Tackle Bag -- Commercial Applications -- Rapid7 Metasploit Pro -- ThreatSim -- PhishMe -- Wombat PhishGuru -- PhishLine -- Open Source Applications -- SET: Social-Engineer Toolkit -- Phishing Frenzy -- Comparison Chart -- Managed or Not -- Summary -- Chapter 8 Phish Like a Boss -- Phishing the Deep End -- Understand What You're Dealing With -- Set Realistic Goals for Your Organization -- Plan Your Program -- Understand the Stats -- Respond Appropriately -- Make the Choice: Build Inside or Outside -- Summary -- Notes -- Index -- EULA
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters
is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe
Description based on publisher supplied metadata and other sources
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries
鏈接 Print version: Hadnagy, Christopher Phishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails Somerset : John Wiley & Sons, Incorporated,c2015 9781118958476
主題 Phishing.;Identity theft
Electronic books
Alt Author Fincher, Michele
Dreeke, Robin
記錄 3 之 3
Record:   Prev Next