LEADER 05353nam 2200661 450 001 9910131151303321 005 20200520144314.0 010 $a1-118-95849-7 035 $a(CKB)3710000000377848 035 $a(EBL)1895166 035 $a(SSID)ssj0001495350 035 $a(PQKBManifestationID)11874025 035 $a(PQKBTitleCode)TC0001495350 035 $a(PQKBWorkID)11450283 035 $a(PQKB)11220604 035 $a(MiAaPQ)EBC1895166 035 $a(Au-PeEL)EBL1895166 035 $a(CaPaEBR)ebr11034356 035 $a(CaONFJC)MIL770077 035 $a(OCoLC)905490497 035 $a(PPN)243410182 035 $a(EXLCZ)993710000000377848 100 $a20150406h20152015 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPhishing dark waters $ethe offensive and defensive sides of malicious e-mails /$fChristopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke 210 1$aIndianapolis, Indiana :$cWiley,$d[2015] 210 4$dİ2015 215 $a1 online resource (227 p.) 300 $aDescription based upon print version of record. 311 $a1-119-18362-6 311 $a1-118-95847-0 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala 327 $aWash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response 327 $aThings to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring 327 $aMy Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good" 327 $aI'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications 327 $aSET: Social-Engineer Toolkit 330 $aAn essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or clo 606 $aPhishing 606 $aIdentity theft 615 0$aPhishing. 615 0$aIdentity theft. 676 $a363.25 676 $a363.259680973 700 $aHadnagy$b Christopher$0873539 702 $aFincher$b Michele 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910131151303321 996 $aPhishing dark waters$91950155 997 $aUNINA