Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Phishing and Communication Channels - Gunikhan Sonowal

Phishing and Communication Channels (eBook)

A Guide to Identifying and Mitigating Phishing Attacks
eBook Download: PDF
2021 | 1st ed.
XVII, 220 Seiten
Apress (Verlag)
978-1-4842-7744-7 (ISBN)
Systemvoraussetzungen
56,99 inkl. MwSt
(CHF 55,65)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.

The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.

Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.

This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.


What You Will Learn

  • Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing
  • Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more
  • Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness
  • Be aware of the techniques that attackers most commonly use to request information
  • Master the best solutions (including educational, legal, technical) to protect against phishing attacks


Who This Book Is For

Security professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. The secondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.


Dr. Gunikhan Sonowal is an Assistant Professor in the Department of Computer Science and Engineering at KL University. His research interests include information security (phishing) and accessibility computing. He received his Bachelor of Science degree (BSc) from Sibsagar College, a Master of Computer Application (MCA) at University of Hyderabad, India, and a PhD in computer science and engineering from Pondicherry University. He has published eight research papers in peer-reviewed journals and international conferences.
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.What You Will LearnUnderstand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishingKnow which communications are most commonly used, including email, SMS, voice, blog, wifi, and moreBe familiar with phishing kits (what they are) and how security experts utilize them to improve user awarenessBe aware of the techniques that attackers most commonly use to request informationMaster the best solutions (including educational, legal, technical) to protect against phishing attacksWho This Book Is ForSecurity professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. The secondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.
Erscheint lt. Verlag 8.12.2021
Zusatzinfo XVII, 220 p. 71 illus.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Content-Injection Phishing • Cyber Attack • DNS-based phishing • Information Security • Man-in-the-middle attacks • Pharming attack • Phishing • Search engine phishing • Smishing (sms phishing) • social engineering attack • Spear Phishing • Vishing(voice phishing) • whaling
ISBN-10 1-4842-7744-9 / 1484277449
ISBN-13 978-1-4842-7744-7 / 9781484277447
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 6,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95