Details

Phishing Dark Waters


Phishing Dark Waters

The Offensive and Defensive Sides of Malicious Emails
1. Aufl.

von: Christopher Hadnagy, Michele Fincher, Robin Dreeke

22,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 18.03.2015
ISBN/EAN: 9781118958483
Sprache: englisch
Anzahl Seiten: 224

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>An essential anti-phishing desk reference for anyone with an email address</b> <p><i>Phishing Dark Waters</i> addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.</p> <p>Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. <i>Phishing Dark Waters</i> explains the phishing process and techniques, and the defenses available to keep scammers at bay.</p> <ul> <li>Learn what a phish is, and the deceptive ways they've been used</li> <li>Understand decision-making, and the sneaky ways phishers reel you in</li> <li>Recognize different types of phish, and know what to do when you catch one</li> <li>Use phishing as part of your security awareness program for heightened protection</li> </ul> <p>Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. <i>Phishing Dark Waters</i> is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.</p>
Foreword xxiii <p>Introduction xxvii</p> <p><b>Chapter 1 An Introduction to the Wild World of Phishing 1</b></p> <p>Phishing 101 2</p> <p>How People Phish 4</p> <p>Examples 7</p> <p>High-Profi le Breaches 7</p> <p>Phish in Their Natural Habitat 10</p> <p>Phish with Bigger Teeth 22</p> <p>Spear Phishing 27</p> <p>Summary 29</p> <p><b>Chapter 2 The Psychological Principles of Decision-Making 33</b></p> <p>Decision-Making: Small Bits 34</p> <p>Cognitive Bias 35</p> <p>Physiological States 37</p> <p>External Factors 38</p> <p>The Bottom Line About Decision-Making 39</p> <p>It Seemed Like a Good Idea at the Time 40</p> <p>How Phishers Bait the Hook 41</p> <p>Introducing the Amygdala 44</p> <p>The Guild of Hijacked Amygdalas 45</p> <p>Putting a Leash on the Amygdala 48</p> <p>Wash, Rinse, Repeat 49</p> <p>Summary 50</p> <p><b>Chapter 3 Influence and Manipulation 53</b></p> <p>Why the Difference Matters to Us 55</p> <p>How Do I Tell the Difference? 56</p> <p>How Will We Build Rapport with Our Targets? 56</p> <p>How Will Our Targets Feel After They Discover They’ve Been Tested? 56</p> <p>What Is Our Intent? 57</p> <p>But the Bad Guys Will Use Manipulation . . . 57</p> <p>Lies, All Lies 58</p> <p>P Is for Punishment 59</p> <p>Principles of Influence 61</p> <p>Reciprocity 61</p> <p>Obligation 62</p> <p>Concession 63</p> <p>Scarcity 63</p> <p>Authority 64</p> <p>Consistency and Commitment 65</p> <p>Liking 66</p> <p>Social Proof 67</p> <p>More Fun with Influence 67</p> <p>Our Social Nature 67</p> <p>Physiological Response 68</p> <p>Psychological Response 69</p> <p>Things to Know About Manipulation 70</p> <p>Summary 71</p> <p><b>Chapter 4 Lessons in Protection 75</b></p> <p>Lesson One: Critical Thinking 76</p> <p>How Can Attackers Bypass This Method? 77</p> <p>Lesson Two: Learn to Hover 77</p> <p>What If I Already Clicked the Link and I Think It’s Dangerous? 80</p> <p>How Can Attackers Bypass This Method? 81</p> <p>Lesson Three: URL Deciphering 82</p> <p>How Can Attackers Bypass This Method? 85</p> <p>Lesson Four: Analyzing E-mail Headers 85</p> <p>How Can Attackers Bypass This Method? 90</p> <p>Lesson Five: Sandboxing 90</p> <p>How Can Attackers Bypass This Method? 91</p> <p>The “Wall of Sheep,” or a Net of Bad Ideas 92</p> <p>Copy and Paste Your Troubles Away 92</p> <p>Sharing Is Caring 93</p> <p>My Mobile Is Secure 94</p> <p>A Good Antivirus Program Will Save You 94</p> <p>Summary 95</p> <p><b>Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program 97</b></p> <p>The Basic Recipe 99</p> <p>Why? 99</p> <p>What’s the Theme? 102</p> <p>The Big, Fat, Not-So-Legal Section 105</p> <p>Developing the Program 107</p> <p>Setting a Baseline 108</p> <p>Setting the Difficulty Level 109</p> <p>Writing the Phish 121</p> <p>Tracking and Statistics 122</p> <p>Reporting 125</p> <p>Phish, Educate, Repeat 127</p> <p>Summary 128</p> <p><b>Chapter 6 The Good, the Bad, and the Ugly: Policies and More 131</b></p> <p>Oh, the Feels: Emotion and Policies 132</p> <p>The Definition 132</p> <p>The Bad 133</p> <p>Making It “Good” 133</p> <p>The Boss Is Exempt 133</p> <p>The Definition 134</p> <p>The Bad 134</p> <p>Making It “Good” 134</p> <p>I’ll Just Patch One of the Holes 135</p> <p>The Definition 135</p> <p>The Bad 136</p> <p>Making It “Good” 136</p> <p>Phish Just Enough to Hate It 136</p> <p>The Definition 137</p> <p>The Bad 137</p> <p>Making It “Good” 138</p> <p>If You Spot a Phish, Call This Number 138</p> <p>The Definition 139</p> <p>The Bad 139</p> <p>Making It “Good” 140</p> <p>The Bad Guys Take Mondays Off 140</p> <p>The Definition 141</p> <p>The Bad 141</p> <p>Making It “Good” 141</p> <p>If You Can’t See It, You Are Safe 142</p> <p>The Definition 142</p> <p>The Bad 143</p> <p>Making It “Good” 143</p> <p>The Lesson for Us All 143</p> <p>Summary 144</p> <p><b>Chapter 7 The Professional Phisher’s Tackle Bag 147</b></p> <p>Commercial Applications 149</p> <p>Rapid7 Metasploit Pro 149</p> <p>ThreatSim 152</p> <p>PhishMe 158</p> <p>Wombat PhishGuru 161</p> <p>PhishLine 165</p> <p>Open Source Applications 168</p> <p>SET: Social-Engineer Toolkit 168</p> <p>Phishing Frenzy 171</p> <p>Comparison Chart 174</p> <p>Managed or Not 176</p> <p>Summary 177</p> <p><b>Chapter 8 Phish Like a Boss 179</b></p> <p>Phishing the Deep End 180</p> <p>Understand What You’re Dealing With 180</p> <p>Set Realistic Goals for Your Organization 182</p> <p>Plan Your Program 183</p> <p>Understand the Stats 183</p> <p>Respond Appropriately 184</p> <p>Make the Choice: Build Inside or Outside 186</p> <p>Summary 187</p> <p>Index 189</p>
<p><b>CHRISTOPHER HADNAGY,</b> author of <i>Social Engineering: The Art of Human Hacking</i>, specializes in the human aspects of technology. With more than 14 years of experience in technology, he is CEO of Social-Engineer, Inc. and a frequent speaker at major security conferences. <b>MICHELE FINCHER</b> possesses more than 20 years experience as a behavioral scientist, researcher, and information security professional. She is a senior penetration tester and Chief Influencing Officer at Social-Engineer, Inc.</p>
<p><b>Learn to catch a phish without becoming live bait.</b></p> <p>Phishing e-mails create daily havoc for both individuals and organizations. A social engineering technique that preys on our human nature, phishing remains remarkably successful for scammers and malicious social engineers despite increasingly sophisticated security programs and awareness campaigns. Christopher Hadnagy and Michele Fincher, practitioners and consultants in human-based security, have spent years working to understand how and why phishing works. In this book, they dissect what a phish is, why it succeeds, and the principles behind it, fully exposing all of its flaws and detailing innovative ways to defend against it. <p>Focusing on the basics of the phish, the underlying psychology, the skillful use of influence, and a creative program to use the phisher's weapons against him, this highly readable guide provides tools for both individuals and corporations. Hadnagy and Fincher examine some of the most current and effective phish, show you how to spot a spoofed e-mail or cloned website, explore phishing education platforms that work, and demonstrate how to create your own phish to use in your security awareness program. <p>Despite legislation, user training, public awareness, and technical security, phishing persists because it exploits our natural responses to e-mail requests. <i>Phishing Dark Waters, The Offensive and Defensive Sides of Malicious E-mails</i> arms you with a greater understanding of: <ul><li>The psychological principles that make phishing effective</li> <li>High-profile breaches, including Target, RSA, and Coca-Cola, that began with a phish</li> <li>Common scams, including those following natural disasters and other highly publicized events </li> <li>Different goals of attackers: financial, corporate espionage, national security, and identity theft threats</li> <li>How to protect your enterprise with a corporate phishing program and integrate it into company policies</li> <li>Ways to catch a phish</li> <li>Why most security awareness programs don't work</li></ul>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €