Amazon cover image
Image from Amazon.com
Image from Google Jackets

Phishing : cutting the identity theft line / Rachael Lininger and Russell Dean Vines.

By: Contributor(s): Material type: TextTextPublication details: Indianapolis, IN : Wiley Pub., c2005.Description: xxv, 309 p. : ill. ; 24 cmISBN:
  • 9780764584985
  • 0764584987 (pbk.)
Subject(s): DDC classification:
  • 364.168 22 LIN
Online resources:
Contents:
Phishing for phun and profit -- Bait and switch : phishing emails -- False fronts : phishing websites -- Are you owned : phishing spyware -- Gloom and doom : you can't stop phishing completely -- Helping your organization avoid phishing -- Fighting back : how your organization can respond to attacks -- Avoiding the hook : consumer education -- Help! I'm a phish : consumer response.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
General Books General Books CUTN Central Library Social Sciences Non-fiction 364.168 LIN (Browse shelf(Opens below)) Available 28062

'Phishing' is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site looks legitimate, and 3 to 5 per cent of people who receive the e-mail go on to surrender their information - to crooks. One e-mail monitoring organization reported 2.3 billion phishing messages in February 2004 alone. If that weren't enough, the crooks have expanded their operations to include malicious code that steals identity information without the computer user's knowledge. Thousands of computers are compromised each day, and phishing code is increasingly becoming part of the standard exploits. Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents. After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened. In "Phishing", Rachael Lininger: offers case studies that reveal the technical ins and outs of impressive phishing attacks; presents a step-by-step model for phishing prevention; explains how intrusion detection systems can help prevent phishers from attaining their goal-identity theft; and, delivers in-depth incident response techniques that can quickly shutdown phishing sites.

Phishing for phun and profit -- Bait and switch : phishing emails -- False fronts : phishing websites -- Are you owned : phishing spyware -- Gloom and doom : you can't stop phishing completely -- Helping your organization avoid phishing -- Fighting back : how your organization can respond to attacks -- Avoiding the hook : consumer education -- Help! I'm a phish : consumer response.

There are no comments on this title.

to post a comment.

Powered by Koha