• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

    Phishing and Communication Channels by Sonowal, Gunikhan;

    A Guide to Identifying and Mitigating Phishing Attacks

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 58.84
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        24 403 Ft (23 241 Ft + 5% VAT)
      • Discount 20% (cc. 4 881 Ft off)
      • Discounted price 19 522 Ft (18 593 Ft + 5% VAT)

    24 403 Ft

    db

    Availability

    printed on demand

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 1st ed.
    • Publisher Apress
    • Date of Publication 9 December 2021
    • Number of Volumes 1 pieces, Book

    • ISBN 9781484277430
    • Binding Paperback
    • No. of pages220 pages
    • Size 254x178 mm
    • Weight 463 g
    • Language English
    • Illustrations XVII, 220 p. 71 illus. Illustrations, black & white
    • 210

    Categories

    Long description:

    Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.

    The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.

    Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.

    This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations fromphishing attacks.


    What You Will Learn

    • Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing
    • Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more
    • Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness
    • Be aware of the techniques that attackers most commonly use to request information
    • Master the best solutions (including educational, legal, technical) to protect against phishing attacks


    Who This Book Is For

    Security professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. Thesecondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.

    More

    Table of Contents:

    1: Introduction to Phishing.- 2: Types of Phishing.- 3: Communication Channels.- 4: What Does a Phishing URL Look Like?.- 5: Characteristics of a Phishing Website.- 6: Phishing Kits.- 7: Training Methods for Phishing Detection.- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws.- 9: Phishing Detection Based on Technology.- Appendix A: Machine Learning Algorithms.- Appendix B: Deep Learning Algorithms.- Appendix C: Natural Language Processing (NLP).- Appendix D: Evaluation Metrics for Phishing Detection Approaches.

    More