Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity TheftMarkus Jakobsson, Steven Myers Wiley, 2007 - 700 lappuses Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures. |
Saturs
Acknowledgements χχίν | 1 |
Information Flow and Chokepoints | 31 |
Spoofing and Countermeasures | 65 |
Autortiesības | |
19 citas sadaļas nav parādītas.
Citi izdevumi - Skatīt visu
Phishing and Countermeasures: Understanding the Increasing Problem of ... Markus Jakobsson,Steven Myers Ierobežota priekšskatīšana - 2006 |
Phishing and Countermeasures: Understanding the Increasing Problem of ... Markus Jakobsson,Steven Myers Priekšskatījums nav pieejams - 2006 |
Bieži izmantoti vārdi un frāzes
algorithm Alice allows anti-phishing application authentication bank biometric browser cache cookies certificate certificate authority client compromised countermeasures credentials credit-card cryptographic detect dictionary attack digital signatures display DKIM domain name eBay email address email spoofing encryption example experiment Figure filtering hash honeypots host identify identity implemented interaction interface Internet IP address keystroke legitimate login machine malicious malware man-in-the-middle man-in-the-middle attack Microsoft min-entropy Mozilla Firefox operating system packet password PayPal personal information phisher phishing attacks phishing email potential problem protect protocol proxy pseudonym public key recipient reputation system request require rootkit router S/MIME Section sender server signature signed social network spam spoofing spoofing attack techniques toolbar trusted path usability user's username verify victim vulnerable window