Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity TheftMarkus Jakobsson, Steven Myers Wiley, 2007 - 700 lappuses Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures. |
No grāmatas satura
1.–3. rezultāts no 73.
145. lappuse
... Public Key Encryption Public key encryption is a technology that allows two parties who have not previously met to send messages between themselves in a private manner that is secure against passive eavesdroppers . Formally , a public key ...
... Public Key Encryption Public key encryption is a technology that allows two parties who have not previously met to send messages between themselves in a private manner that is secure against passive eavesdroppers . Formally , a public key ...
564. lappuse
... public key cryptography in 1976 specifically to overcome this problem and allow the exchange of encrypted messages over electronic data networks by individuals who had not previously decided upon a cipher or key [ 7 ] . Public key cryp ...
... public key cryptography in 1976 specifically to overcome this problem and allow the exchange of encrypted messages over electronic data networks by individuals who had not previously decided upon a cipher or key [ 7 ] . Public key cryp ...
565. lappuse
... public keys of their friends and business associates , whereas S / MIME employs a top - down strategy in which keys are certified by centralized Certificate Authorities . 16.1.1 The Key ... keys that SECURE ELECTRONIC MAIL : A BRIEF HISTORY ...
... public keys of their friends and business associates , whereas S / MIME employs a top - down strategy in which keys are certified by centralized Certificate Authorities . 16.1.1 The Key ... keys that SECURE ELECTRONIC MAIL : A BRIEF HISTORY ...
Saturs
Acknowledgements χχίν | 1 |
Information Flow and Chokepoints | 31 |
Spoofing and Countermeasures | 65 |
Autortiesības | |
19 citas sadaļas nav parādītas.
Citi izdevumi - Skatīt visu
Phishing and Countermeasures: Understanding the Increasing Problem of ... Markus Jakobsson,Steven Myers Ierobežota priekšskatīšana - 2006 |
Phishing and Countermeasures: Understanding the Increasing Problem of ... Markus Jakobsson,Steven Myers Priekšskatījums nav pieejams - 2006 |
Bieži izmantoti vārdi un frāzes
algorithm Alice allows anti-phishing application authentication bank biometric browser cache cookies certificate certificate authority client compromised countermeasures credentials credit-card cryptographic detect dictionary attack digital signatures display DKIM domain name eBay email address email spoofing encryption example experiment Figure filtering hash honeypots host identify identity implemented interaction interface Internet IP address keystroke legitimate login machine malicious malware man-in-the-middle man-in-the-middle attack Microsoft min-entropy Mozilla Firefox operating system packet password PayPal personal information phisher phishing attacks phishing email potential problem protect protocol proxy pseudonym public key recipient reputation system request require rootkit router S/MIME Section sender server signature signed social network spam spoofing spoofing attack techniques toolbar trusted path usability user's username verify victim vulnerable window