𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

✍ Scribed by Gunikhan Sonowal


Publisher
Apress
Year
2021
Tongue
English
Leaves
237
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.

The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.

Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.

This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.


What You Will Learn

  • Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing
  • Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more
  • Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness
  • Be aware of the techniques that attackers most commonly use to request information
  • Master the best solutionsΒ (including educational, legal, technical)Β to protect against phishing attacks


Who This Book Is For

Security professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. The secondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.


πŸ“œ SIMILAR VOLUMES


Phishing and Communication Channels: A G
✍ Gunikhan Sonowal πŸ“‚ Library πŸ“… 2021 πŸ› Apress 🌐 English

<p>Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.</p> <p>The aim of phishing is to fraudulently obtain sensitive credentials such as passwo

Phishing and Communication Channels: A G
✍ Gunikhan Sonowal πŸ“‚ Library πŸ“… 2021 πŸ› Apress 🌐 English

<p><span>Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.</span></p><p><span>The aim of phishing is to fraudulently obtain sensitive credenti

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles πŸ“‚ Library πŸ“… 2023 πŸ› Apress 🌐 English

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization a

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles πŸ“‚ Library πŸ“… 2023 πŸ› Apress 🌐 English

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization a

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles πŸ“‚ Library πŸ“… 2023 πŸ› Apress 🌐 English

<p><span>Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.</span></p><p><

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles πŸ“‚ Library πŸ“… 2023 πŸ› Apress 🌐 English

<p><span>Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.</span></p><p><