Atnaujinkite slapukų nuostatas

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails [Minkštas viršelis]

3.83/5 (214 ratings by Goodreads)
  • Formatas: Paperback / softback, 224 pages, aukštis x plotis x storis: 226x152x10 mm, weight: 272 g
  • Išleidimo metai: 15-May-2015
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1118958470
  • ISBN-13: 9781118958476
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 224 pages, aukštis x plotis x storis: 226x152x10 mm, weight: 272 g
  • Išleidimo metai: 15-May-2015
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1118958470
  • ISBN-13: 9781118958476
Kitos knygos pagal šią temą:
An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.

Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer.Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay.

  • Learn what a phish is, and the deceptive ways they've been used
  • Understand decision-making, and the sneaky ways phishers reel you in
  • Recognize different types of phish, and know what to do when you catch one
  • Use phishing as part of your security awareness program for heightened protection

Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations.Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

Foreword xxiii
Introduction xxvii
Chapter 1 An Introduction to the Wild World of Phishing
1(32)
Phishing 101
2(2)
How People Phish
4(3)
Examples
7(22)
High-Profile Breaches
7(3)
Phish in Their Natural Habitat
10(12)
Phish with Bigger Teeth
22(5)
Spear Phishing
27(2)
Summary
29(4)
Chapter 2 The Psychological Principles of Decision-Making
33(20)
Decision-Making: Small Bits
34(6)
Cognitive Bias
35(2)
Physiological States
37(1)
External Factors
38(1)
The Bottom Line About Decision-Making
39(1)
It Seemed Like a Good Idea at the Time
40(1)
How Phishers Bait the Hook
41(3)
Introducing the Amygdala
44(5)
The Guild of Hijacked Amygdalas
45(3)
Putting a Leash on the Amygdala
48(1)
Wash, Rinse, Repeat
49(1)
Summary
50(3)
Chapter 3 Influence and Manipulation
53(22)
Why the Difference Matters to Us
55(1)
How Do I Tell the Difference?
56(1)
How Will We Build Rapport with Our Targets?
56(1)
How Will Our Targets Feel After They Discover They've Been Tested?
56(1)
What Is Our Intent?
57(1)
But the Bad Guys Will Use Manipulation ...
57(1)
Lies, All Lies
58(1)
P Is for Punishment
59(2)
Principles of Influence
61(6)
Reciprocity
61(1)
Obligation
62(1)
Concession
63(1)
Scarcity
63(1)
Authority
64(1)
Consistency and Commitment
65(1)
Liking
66(1)
Social Proof
67(1)
More Fun with Influence
67(3)
Our Social Nature
67(1)
Physiological Response
68(1)
Psychological Response
69(1)
Things to Know About Manipulation
70(1)
Summary
71(4)
Chapter 4 Lessons in Protection
75(22)
Lesson One Critical Thinking
76(1)
How Can Attackers Bypass This Method?
77(1)
Lesson Two Learn to Hover
77(5)
What If I Already Clicked the Link and I Think It's Dangerous?
80(1)
How Can Attackers Bypass This Method?
81(1)
Lesson Three URL Deciphering
82(3)
How Can Attackers Bypass This Method?
85(1)
Lesson Four Analyzing E-mail Headers
85(5)
How Can Attackers Bypass This Method?
90(1)
Lesson Five Sandboxing
90(2)
How Can Attackers Bypass This Method?
91(1)
The "Wall of Sheep," or a Net of Bad Ideas
92(3)
Copy and Paste Your Troubles Away
92(1)
Sharing Is Caring
93(1)
My Mobile Is Secure
94(1)
A Good Antivirus Program Will Save You
94(1)
Summary
95(2)
Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program
97(34)
The Basic Recipe
99(8)
Why?
99(3)
What's the Theme?
102(3)
The Big, Fat, Not-So-Legal Section
105(2)
Developing the Program
107(21)
Setting a Baseline
108(1)
Setting the Difficulty Level
109(12)
Writing the Phish
121(1)
Tracking and Statistics
122(3)
Reporting
125(2)
Phish, Educate, Repeat
127(1)
Summary
128(3)
Chapter 6 The Good, the Bad, and the Ugly: Policies and More
131(16)
Oh, the Feels: Emotion and Policies
132(1)
The Definition
132(1)
The Bad
133(1)
Making It "Good"
133(1)
The Boss Is Exempt
133(2)
The Definition
134(1)
The Bad
134(1)
Making It "Good"
134(1)
I'll Just Patch One of the Holes
135(1)
The Definition
135(1)
The Bad
136(1)
Making It "Good"
136(1)
Phish Just Enough to Hate It
136(2)
The Definition
137(1)
The Bad
137(1)
Making It "Good"
138(1)
If You Spot a Phish, Call This Number
138(2)
The Definition
139(1)
The Bad
139(1)
Making It "Good"
140(1)
The Bad Guys Take Mondays Off
140(2)
The Definition
141(1)
The Bad
141(1)
Making It "Good"
141(1)
If You Can't See It, You Are Safe
142(1)
The Definition
142(1)
The Bad
143(1)
Making It "Good"
143(1)
The Lesson for Us All
143(1)
Summary
144(3)
Chapter 7 The Professional Phisher's Tackle Bag
147(32)
Commercial Applications
149(19)
Rapid7 Metasploit Pro
149(3)
ThreatSim
152(6)
PhishMe
158(3)
Wombat PhishGuru
161(4)
PhishLine
165(3)
Open Source Applications
168(6)
SET: Social-Engineer Toolkit
168(3)
Phishing Frenzy
171(3)
Comparison Chart
174(2)
Managed or Not
176(1)
Summary
177(2)
Chapter 8 Phish Like a Boss
179(10)
Phishing the Deep End
180(7)
Understand What You're Dealing With
180(2)
Set Realistic Goals for Your Organization
182(1)
Plan Your Program
183(1)
Understand the Stats
183(1)
Respond Appropriately
184(2)
Make the Choice: Build Inside or Outside
186(1)
Summary
187(2)
Index 189
CHRISTOPHER HADNAGY, author of Social Engineering: The Art of Human Hacking, specializes in the human aspects of technology. With more than 14 years of experience in technology, he is CEO of Social-Engineer, Inc. and a frequent speaker at major security conferences. MICHELE FINCHER possesses more than 20 years experience as a behavioral scientist, researcher, and information security professional. She is a senior penetration tester and Chief Influencing Officer at Social-Engineer, Inc.