• Complain

Gunikhan Sonowal - Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

Here you can read online Gunikhan Sonowal - Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Apress, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Gunikhan Sonowal Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
  • Book:
    Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.

The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.

Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizons 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.

This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.

What You Will Learn

  • Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing
  • Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more
  • Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness
  • Be aware of the techniques that attackers most commonly use to request information
  • Master the best solutions (including educational, legal, technical) to protect against phishing attacks


Who This Book Is For

Security professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. The secondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.

Gunikhan Sonowal: author's other books


Who wrote Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Phishing and Communication Channels Gunikhan Sonowal - photo 1
Book cover of Phishing and Communication Channels
Gunikhan Sonowal
Phishing and Communication Channels
A Guide to Identifying and Mitigating Phishing Attacks
Logo of the publisher Gunikhan Sonowal Tinsukia Assam India ISBN - photo 2
Logo of the publisher
Gunikhan Sonowal
Tinsukia, Assam, India
ISBN 978-1-4842-7743-0 e-ISBN 978-1-4842-7744-7
https://doi.org/10.1007/978-1-4842-7744-7
Gunikhan Sonowal 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Apress imprint is published by the registered company APress Media, LLC part of Springer Nature.

The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub. For more detailed information, please visit www.apress.com/source-code.

Acknowledgments

First and foremost, Id like to thank my adviser, Dr. K. S. Kuppusamy, an assistant professor at Pondicherry University, India, for his unwavering support throughout this project. In addition, Id like to share this happy occasion with my family, who are the most important source of my lifes strength. My wife Mrs. Gitimoni Chutia Sonowal, my parents (Mr. Nandeswar Sonowal and Mrs. Nilima Sonowal), and my sisters (Jimpa and Simpa) have been invaluable during these years, and it would have been difficult for me to complete this task without their encouragement, prayers, and understanding.

I especially thank Susan McDermott, Mark Powers, and Nirmal Selvaraj at Apress.

Table of Contents
5.1.1 Fake Tag
5.1.2 Tag
About the Author
Gunikhan Sonowal

is currently working as an assistant professor in the Department of Computer Science and Engineering at KL University, India. He has been teaching information security, including phishing and social engineering attacks, for the past four years.He holds a Masters degree in computer science from the University of Hyderabad and a Doctor of Philosophy in computer science from Pondicherry University. He further qualified GATE (Graduate Aptitude Test Engineering), Organized by IISc Bangalore in the year 2016, and CBSE NET (Central Board of Secondary Education - National Eligibility Test) in the year 2017, Organised by UGC (University Grants Commission). He has published more than ten research papers in the area of phishing in reputable journals and international conferences. In addition, he is a regular reviewer for Elseviers King Saud University Journal and Oxford University Presss The Computer Journals.

About the Technical Reviewer
Massimo Nardone
has more than 25 years of experience in security webmobile development - photo 3
has more than 25 years of experience in security, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 20 years. He holds a Master of Science degree in computing science from the University of Salerno, Italy.

He has worked as a CISO, CSO, security executive, IoT executive, project manager, software engineer, research engineer, chief security architect, PCI/SCADA auditor, and senior lead IT security/cloud/SCADA architect for many years. His technical skills include security, Android, cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, Scratch, and more.

He has worked as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University). He holds four international patents (in the areas of PKI, SIP, SAML, and proxies). He is currently working for Cognizant as head of cybersecurity and as CISO to help clients both internally and externally in the areas of information and cybersecurity such as strategy, planning, processes, policies, procedures, governance, awareness, and so forth. In June 2017 he became a permanent member of the ISACA Finland Board.

Massimo has reviewed more than 45 IT books for different publishing companies and is the co-author of Pro Spring Security, Securing Spring Framework 5 and Boot 2-based Java Applications (Apress, 2019), Beginning EJB in Java EE 8 (Apress, 2018), Pro JPA 2 in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).

The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
G. Sonowal Phishing and Communication Channels https://doi.org/10.1007/978-1-4842-7744-7_1
1. Introduction to Phishing
Gunikhan Sonowal
(1)
Tinsukia, Assam, India

The great majority of work across a wide variety of industries is now carried out by individuals or corporations using the Internet to complete their tasks. People, companies, and governments work together to provide online users with a wide range of online services, such as data transfers, monetary transactions, online shopping, communication services, and more. Despite the many benefits of the Internet, cyberattacks can lead individuals, organizations, or corporations to lose a substantial amount of information or money. Criminals and attackers steal login credentials, bank information, Social Security numbers, and other personal data from web-based users in cyberattacks. Attackers then use the credentials to purchase items online, withdraw money from financial institutions, apply for credit cards, and request the cash from the victims contacts through email and social media.

There are many ways to launch a cyberattack, such as phishing emails with malicious attachments, ransomware, and denial of service, among others. Phishing has long been one of the most widespread forms of online fraud. It often involves creating a phony website that imitates a legitimate website to gain user credentials. Falsely representing a respectable website has the goal of convincing victims that the false site is real. According to the 201819 EY Global Information Security Survey, phishing is the most effective cyberattack in cyberspace.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks»

Look at similar books to Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks»

Discussion, reviews of the book Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.