Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity TheftMarkus Jakobsson, Steven Myers John Wiley & Sons, 5. des. 2006 - 739 sider Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures. |
Inni boken
Resultat 1-5 av 44
Side x
... to Derive Mother's Maiden Names 139 139 144 145 146 147 149 151 152 152 155 159 161 162 166 168 170 172 175 175 177 182 185 187 190 190 191 193 193 194 196 196 198 199 199 6.4 6.5 6.6 6.7 Case Study: Using Your Social Network X CONTENTS.
... to Derive Mother's Maiden Names 139 139 144 145 146 147 149 151 152 152 155 159 161 162 166 168 170 172 175 175 177 182 185 187 190 190 191 193 193 194 196 196 198 199 199 6.4 6.5 6.6 6.7 Case Study: Using Your Social Network X CONTENTS.
Side xi
... Social Network Against You 6.4.1 Motivations of a Social Phishing Attack Experiment 6.4.2 Design Considerations 6.4.3 Data Mining 6.4.4 Performing the Attack 6.4.5 Results 6.4.6 Reactions Expressed in Experiment Blog Case Study: Browser ...
... Social Network Against You 6.4.1 Motivations of a Social Phishing Attack Experiment 6.4.2 Design Considerations 6.4.3 Data Mining 6.4.4 Performing the Attack 6.4.5 Results 6.4.6 Reactions Expressed in Experiment Blog Case Study: Browser ...
Side xv
... Social Networks 14.1 14.2 14.3 14.4 The Role of Trust Online Existing Solutions for Securing Trust Online 14.2.1 Reputation Systems and Social Networks 14.2.2 Third-Party Certifications 14.2.3 First-Party Assertions 14.2.4 Existing ...
... Social Networks 14.1 14.2 14.3 14.4 The Role of Trust Online Existing Solutions for Securing Trust Online 14.2.1 Reputation Systems and Social Networks 14.2.2 Third-Party Certifications 14.2.3 First-Party Assertions 14.2.4 Existing ...
Side 2
... social networks which aim to make the attacks more risky or easily identifiable, and therefore less profitable for phishers. Additionally, since phishing attacks are often successful because the average user does not understand, and ...
... social networks which aim to make the attacks more risky or easily identifiable, and therefore less profitable for phishers. Additionally, since phishing attacks are often successful because the average user does not understand, and ...
Side 3
... social engineering and identity impersonation through spoofing to steal ... Internet user. Similarly, phishers no longer restrict themselves to ... net consist of a large numbers ioften in the thousands— of computers that have been ...
... social engineering and identity impersonation through spoofing to steal ... Internet user. Similarly, phishers no longer restrict themselves to ... net consist of a large numbers ioften in the thousands— of computers that have been ...
Andre utgaver - Vis alle
Phishing and Countermeasures: Understanding the Increasing Problem of ... Markus Jakobsson,Steven Myers Ingen forhåndsvisning tilgjengelig - 2006 |
Vanlige uttrykk og setninger
algorithm Alice allows anti-phishing application authentication bank benefits biometric browser cache cookies certificate client compromised confidential information countermeasures credentials credit-card cryptographic defined detect dictionary attack difficult digital signatures display DKIM domain name eBay email address encryption example experiment field Figure file filtering financial find first hash honeypots host identifier identity identity theft implemented interaction interface Internet IP address keystroke legitimate login machine malicious malware man-in-the-middle attack Microsoft min-entropy operating system packet password PayPal phisher phishing attacks phishing email potential protect protocol proxy pseudonym public key recipient reputation system require rootkit router S/MIME Section sender server signature signed SMTP social network spam specific spoofed spoofing techniques toolbar traffic trusted path usability USENIX user’s verification victim vulnerable window
Populære avsnitt
Side 642 - ... (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.
Side 657 - IRB finds and documents that: 1. the research involves no more than minimal risk to the subjects; 2. the waiver or alteration will not adversely affect the rights and welfare of the subjects; 3. the research could not practicably be carried out without the waiver or alteration; and 4. whenever appropriate, the subjects will be provided with additional pertinent information after participation.
Side 671 - header information" means the source, destination, and routing information attached to an electronic mail message, including the originating domain name and originating electronic mail address, and any other information that appears in the line identifying, or purporting to identify, a person initiating the message.
Side 652 - One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.
Side 453 - P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization.
Side 137 - S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in Your Spare Time.