Language:
English
繁體中文
Help
Login
Back
to Search results for
[ subject:"Data and Information Security." ]
Switch To:
Labeled
|
MARC Mode
|
ISBD
Phishing and Communication Channels = A Guide to Identifying and Mitigating Phishing Attacks /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Phishing and Communication Channels/ by Gunikhan Sonowal.
Reminder of title:
A Guide to Identifying and Mitigating Phishing Attacks /
Author:
Sonowal, Gunikhan.
Description:
XVII, 220 p. 71 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-1-4842-7744-7
ISBN:
9781484277447
Phishing and Communication Channels = A Guide to Identifying and Mitigating Phishing Attacks /
Sonowal, Gunikhan.
Phishing and Communication Channels
A Guide to Identifying and Mitigating Phishing Attacks /[electronic resource] :by Gunikhan Sonowal. - 1st ed. 2022. - XVII, 220 p. 71 illus.online resource.
1: Introduction to Phishing -- 2: Types of Phishing -- 3: Communication Channels -- 4: What Does a Phishing URL Look Like? -- 5: Characteristics of a Phishing Website -- 6: Phishing Kits -- 7: Training Methods for Phishing Detection -- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws -- 9: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep Learning Algorithms -- Appendix C: Natural Language Processing (NLP) -- Appendix D: Evaluation Metrics for Phishing Detection Approaches. .
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks. What You Will Learn Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness Be aware of the techniques that attackers most commonly use to request information Master the best solutions (including educational, legal, technical) to protect against phishing attacks.
ISBN: 9781484277447
Standard No.: 10.1007/978-1-4842-7744-7doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Phishing and Communication Channels = A Guide to Identifying and Mitigating Phishing Attacks /
LDR
:03518nam a22004215i 4500
001
1093376
003
DE-He213
005
20221104140703.0
007
cr nn 008mamaa
008
221228s2022 xxu| s |||| 0|eng d
020
$a
9781484277447
$9
978-1-4842-7744-7
024
7
$a
10.1007/978-1-4842-7744-7
$2
doi
035
$a
978-1-4842-7744-7
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Sonowal, Gunikhan.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1401301
245
1 0
$a
Phishing and Communication Channels
$h
[electronic resource] :
$b
A Guide to Identifying and Mitigating Phishing Attacks /
$c
by Gunikhan Sonowal.
250
$a
1st ed. 2022.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
XVII, 220 p. 71 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
1: Introduction to Phishing -- 2: Types of Phishing -- 3: Communication Channels -- 4: What Does a Phishing URL Look Like? -- 5: Characteristics of a Phishing Website -- 6: Phishing Kits -- 7: Training Methods for Phishing Detection -- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws -- 9: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep Learning Algorithms -- Appendix C: Natural Language Processing (NLP) -- Appendix D: Evaluation Metrics for Phishing Detection Approaches. .
520
$a
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks. What You Will Learn Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness Be aware of the techniques that attackers most commonly use to request information Master the best solutions (including educational, legal, technical) to protect against phishing attacks.
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Data and Information Security.
$3
1365785
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484277430
776
0 8
$i
Printed edition:
$z
9781484277454
776
0 8
$i
Printed edition:
$z
9781484291269
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7744-7
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login