LEADER 03622nam 22004935 450 001 9910522998103321 005 20230804145735.0 010 $a1-4842-7744-9 024 7 $a10.1007/978-1-4842-7744-7 035 $a(MiAaPQ)EBC6824253 035 $a(Au-PeEL)EBL6824253 035 $a(CKB)20094176200041 035 $a(OCoLC)1288274354 035 $a(OCoLC-P)1288274354 035 $a(CaSebORM)9781484277447 035 $a(DE-He213)978-1-4842-7744-7 035 $a(PPN)266357148 035 $a(EXLCZ)9920094176200041 100 $a20220124d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPhishing and Communication Channels $eA Guide to Identifying and Mitigating Phishing Attacks /$fby Gunikhan Sonowal 205 $a1st ed. 2022. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2022. 215 $a1 online resource (230 pages) 311 08$aPrint version: Sonowal, Gunikhan Phishing and Communication Channels Berkeley, CA : Apress L. P.,c2021 9781484277430 327 $a1: Introduction to Phishing -- 2: Types of Phishing -- 3: Communication Channels -- 4: What Does a Phishing URL Look Like? -- 5: Characteristics of a Phishing Website -- 6: Phishing Kits -- 7: Training Methods for Phishing Detection -- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws -- 9: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep Learning Algorithms -- Appendix C: Natural Language Processing (NLP) -- Appendix D: Evaluation Metrics for Phishing Detection Approaches. . 330 $aMitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon?s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks. What You Will Learn Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness Be aware of the techniques that attackers most commonly use to request information Master the best solutions (including educational, legal, technical) to protect against phishing attacks. 606 $aPhishing$xPrevention 606 $aComputer security 615 0$aPhishing$xPrevention. 615 0$aComputer security. 676 $a364.168 700 $aSonowal$b Gunikhan$01080010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910522998103321 996 $aPhishing and Communication Channels$92592702 997 $aUNINA