Phishing: Cutting the Identity Theft Line
暫譯: 釣魚攻擊:斷絕身份盜竊的鏈條
Rachael Lininger, Russell Dean Vines
- 出版商: Wiley
- 出版日期: 2005-05-06
- 定價: $1,050
- 售價: 1.9 折 $199
- 語言: 英文
- 頁數: 334
- 裝訂: Paperback
- ISBN: 0764584987
- ISBN-13: 9780764584985
-
相關分類:
資訊安全、Computer-networks、駭客 Hack
立即出貨(限量) (庫存=4)
買這商品的人也買了...
-
$620$490 -
$520$411 -
$690$587 -
$780CMMI: Guidelines for Process Integration and Product Improvement (Harcover)
-
$720$569 -
$750$593 -
$650$514 -
$650$507 -
$680$578 -
$620$490 -
$750$593 -
$560$437 -
$990$842 -
$780$616 -
$580$493 -
$550$495 -
$480$379 -
$880$695 -
$880$695 -
$680$537 -
$880$695 -
$750$585 -
$560$442 -
$880$695 -
$680$537
商品描述
Description:
"Phishing" is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site looks legitimate, and 3 to 5 percent of people who receive the e-mail go on to surrender their information-to crooks. One e-mail monitoring organization reported 2.3 billion phishing messages in February 2004 alone.
If that weren't enough, the crooks have expanded their operations to include malicious code that steals identity information without the computer user's knowledge. Thousands of computers are compromised each day, and phishing code is increasingly becoming part of the standard exploits.
Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents. After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened.
In Phishing, Rachael Lininger:
* Offers case studies that reveal the technical ins and outs of impressive phishing attacks
* Presents a step-by-step model for phishing prevention
* Explains how intrusion detection systems can help prevent phishers from attaining their goal-identity theft
* Delivers in-depth incident response techniques that can quickly shutdown phishing sites
Table of Contents:
About the Authors.Introduction.
Chapter 1: Phishing for Phun and Profit.
Chapter 2: Bait and Switch: Phishing Emails.
Chapter 3: False Fronts: Phishing Websites.
Chapter 4: Are You Owned? Understanding Phishing Spyware.
Chapter 5: Gloom and Doom: You Can’t Stop Phishing Completely.
Chapter 6: Helping Your Organization Avoid Phishing.
Chapter 7: Fighting Back: How Your Organization Can Respond to Attacks.
Chapter 8: Avoiding the Hook: Consumer Education.
Chapter 9: Help! I’m a Phish! Consumer Response.
Appendix A: Glossary of Phishing-Related Terms.
Appendix B: Useful Websites.
Appendix C: Identity Theft Affidavit.
Index.
商品描述(中文翻譯)
**描述:**
「釣魚」是當前熱門的身份盜竊詐騙手法。一名毫無防備的受害者收到一封看似來自銀行或其他金融機構的電子郵件,裡面包含一個連結,要求他/她提供帳戶詳細資訊。該網站看起來合法,約有3%到5%的人在收到電子郵件後會將自己的資訊交給詐騙者。一個電子郵件監控組織報告指出,僅在2004年2月就有23億封釣魚郵件。如果這還不夠,詐騙者已擴大其行動範圍,包含惡意程式碼,能在電腦使用者不知情的情況下竊取身份資訊。每天都有數千台電腦受到侵害,而釣魚程式碼正逐漸成為標準的攻擊手法。
這本獨特的書籍由一位來自頂尖金融機構的釣魚安全專家撰寫,幫助IT專業人員應對釣魚事件。在詳細描述釣魚行動的內容後,作者提供逐步指導,以防止攻擊並應對已發生的事件。
在《釣魚》中,Rachael Lininger:
* 提供案例研究,揭示令人印象深刻的釣魚攻擊的技術細節
* 提出釣魚預防的逐步模型
* 解釋入侵檢測系統如何幫助防止釣魚者達成其目標——身份盜竊
* 提供深入的事件響應技術,能迅速關閉釣魚網站
**目錄:**
關於作者。
導言。
第1章:釣魚的樂趣與利潤。
第2章:誘餌與替換:釣魚電子郵件。
第3章:虛假前台:釣魚網站。
第4章:你被擁有了嗎?理解釣魚間諜軟體。
第5章:陰霾與厄運:你無法完全阻止釣魚。
第6章:幫助你的組織避免釣魚。
第7章:反擊:你的組織如何應對攻擊。
第8章:避免上鉤:消費者教育。
第9章:救命!我是一條魚!消費者反應。
附錄A:釣魚相關術語詞彙表。
附錄B:有用的網站。
附錄C:身份盜竊宣誓書。
索引。