Information Security Management Handbook

Information Security Management Handbook
Автор
 
Год
 
Страниц
 
456
ISBN
 
ISBN13:9781420067088;ISBN10:1420067087
Издатель
 
Auerbach Publications

Описание:

The book has a particularly good summary of phishing. Explaining the main attack methods used by phishers to trick users into divulging sensitive financial data about themselves. It also goes into how phishers use compromised computers to inject their messages into the net. The reader should note that in most cases, these computers are not the targets of the bad phishing links inside the messages. So one lesson is that we must expect that phishers will always be able to disseminate messages. The countermeasures are given. For a far more extensive discussion, check out Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. However, neither book has made the conceptual leap to using Partner Lists and custom tags inside real messages from banks.

Похожие книги

Basic Telephone TrainingBasic Telephone Training
Автор: Anne Watson-Delestree
Год: 1992
Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science)Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science)
Автор: Qingfeng Chen, Chengqi Zhang, Shichao Zhang
Год: 2008