libcats.org
Главная

Information Security Management Handbook

Обложка книги Information Security Management Handbook

Information Security Management Handbook

,
The book has a particularly good summary of phishing. Explaining the main attack methods used by phishers to trick users into divulging sensitive financial data about themselves.
It also goes into how phishers use compromised computers to inject their messages into the net. The reader should note that in most cases, these computers are not the targets of the bad phishing links inside the messages. So one lesson is that we must expect that phishers will always be able to disseminate messages.
The countermeasures are given. For a far more extensive discussion, check out Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. However, neither book has made the conceptual leap to using Partner Lists and custom tags inside real messages from banks.
Популярные книги за неделю:

Самоделки школьника

Автор:
Категория: science, science, technical, hobby, oddjob
Размер книги: 41.91 Mb

Момент истины. В августе 44-го

Автор:
Категория: ИСТОРИЯ
Размер книги: 1.52 Mb
Только что пользователи скачали эти книги:

Ведьмы за границей

Автор:
Размер книги: 545 Kb

Влад Йовицэ. Дмитрий Кантемир

Автор:
Размер книги: 122 Kb

Умение продавать для чайников

Автор:
Категория: Продажи
Размер книги: 1.81 Mb