LEADER 03630nam 22005055 450 001 9910731463603321 005 20230620110640.0 010 $a1-4842-9361-4 024 7 $a10.1007/978-1-4842-9361-4 035 $a(MiAaPQ)EBC30604798 035 $a(Au-PeEL)EBL30604798 035 $a(DE-He213)978-1-4842-9361-4 035 $a(PPN)27227139X 035 $a(OCoLC)1388360682 035 $a(OCoLC-P)1388360682 035 $a(CaSebORM)9781484293614 035 $a(CKB)27152775900041 035 $a(EXLCZ)9927152775900041 100 $a20230620d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHow to Catch a Phish$b[electronic resource] $eA Practical Guide to Detecting Phishing Emails /$fby Nicholas Oles 205 $a1st ed. 2023. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2023. 215 $a1 online resource (153 pages) 300 $aIncludes index. 311 $a1-4842-9360-6 327 $aChapter 1. How Email Works -- Chapter 2. Phishing Tactics and Techniques -- Chapter 3. PICERL Process explained -- Chapter 4. Analyzing Message Content -- Chapter 5. Links -- Chapter 6. Attachments -- Chapter 7. Log Searching and Response -- Chapter 8. Remediation and Lessons Learned. 330 $aLearn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis Identify what information is in an email header Review header information and extract key indicators or patterns used for detection Identify signs of a suspicious or malicious email message Detect the tactics that attackers use in phishing emails Safely examine email links and attachments Use a variety of free and simple tools to analyze email messages. 606 $aPhishing$xPrevention 606 $aElectronic mail messages$xSecurity measures 615 0$aPhishing$xPrevention. 615 0$aElectronic mail messages$xSecurity measures. 676 $a005.82 700 $aOles$b Nicholas$01369088 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910731463603321 996 $aHow to Catch a Phish$93395199 997 $aUNINA