Amazon cover image
Image from Amazon.com

Phishing and communication channels : a guide to identifying and mitigating phishing attacks / Gunikhan Sonowal

By: Material type: TextTextPublication details: India Apress 2022Description: 220 pISBN:
  • 9781484291269
Subject(s): DDC classification:
  • 364.1632 SON-G
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Copy number Status Date due Barcode Item holds
Books Books BITS Pilani Hyderabad 360 General Stack (For lending) 364.1632 SON-G (Browse shelf(Opens below)) INR 899.00 Available 47562
Total holds: 0

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.

The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.

Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.

This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.

What You Will Learn:
* Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing
* Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more
* Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness
* Be aware of the techniques that attackers most commonly use to request information
* Master the best solutions (including educational, legal, technical) to protect against phishing attacks

There are no comments on this title.

to post a comment.
An institution deemed to be a University Estd. Vide Sec.3 of the UGC
Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2015 BITS-Library, BITS-Hyderabad, India.