LEADER 05225nam 2200649 a 450 001 9910830161303321 005 20230721025834.0 010 $a1-280-82196-5 010 $a9786610821969 010 $a0-470-08610-6 010 $a0-470-08609-2 035 $a(CKB)1000000000354640 035 $a(EBL)287285 035 $a(OCoLC)437176731 035 $a(SSID)ssj0000221131 035 $a(PQKBManifestationID)11175314 035 $a(PQKBTitleCode)TC0000221131 035 $a(PQKBWorkID)10157593 035 $a(PQKB)10163665 035 $a(MiAaPQ)EBC287285 035 $a(EXLCZ)991000000000354640 100 $a20060612d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aPhishing and countermeasures$b[electronic resource] $eunderstanding the increasing problem of electronic identity theft /$fedited by Markus Jakobsson, Steven Myers 210 $aHoboken, N.J. $cWiley-Interscience$dc2007 215 $a1 online resource (730 p.) 300 $aDescription based upon print version of record. 311 $a0-471-78245-9 320 $aIncludes bibliographical references and index. 327 $aPhishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References 327 $a2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 327 $a2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 327 $a3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 327 $a4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 327 $a4.5.2 Detection and Countermeasures 330 $aPhishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures. 606 $aPhishing 606 $aIdentity theft$xPrevention 606 $aComputer security 615 0$aPhishing. 615 0$aIdentity theft$xPrevention. 615 0$aComputer security. 676 $a005.9 676 $a364.163 701 $aJakobsson$b Markus$0858802 701 $aMyers$b Steven$f1975-$01611262 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830161303321 996 $aPhishing and countermeasures$93939429 997 $aUNINA