Phishing and Communication Channels : A Guide to Identifying and Mitigating Phishing Attacks (1st)

個数:
  • ポイントキャンペーン

Phishing and Communication Channels : A Guide to Identifying and Mitigating Phishing Attacks (1st)

  • ウェブストア価格 ¥10,432(本体¥9,484)
  • APress(2021/12発売)
  • 外貨定価 US$ 54.99
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 470pt
  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 220 p.
  • 言語 ENG
  • 商品コード 9781484277430
  • DDC分類 364.1632

Full Description

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.

The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.

Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.

This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations fromphishing attacks.

What You Will Learn

Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing
Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more
Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness
Be aware of the techniques that attackers most commonly use to request information
Master the best solutions (including educational, legal, technical) to protect against phishing attacks

Who This Book Is For

Security professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. Thesecondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.

Contents

1: Introduction to Phishing.- 2: Types of Phishing.- 3: Communication Channels.- 4: What Does a Phishing URL Look Like?.- 5: Characteristics of a Phishing Website.- 6: Phishing Kits.- 7: Training Methods for Phishing Detection.- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws.- 9: Phishing Detection Based on Technology.- Appendix A: Machine Learning Algorithms.- Appendix B: Deep Learning Algorithms.- Appendix C: Natural Language Processing (NLP).- Appendix D: Evaluation Metrics for Phishing Detection Approaches. 

最近チェックした商品