How to catch a phish : a practical guide to detecting phishing emails / Nicholas Oles.
2023
QA76.9.A25
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
How to catch a phish : a practical guide to detecting phishing emails / Nicholas Oles.
Author
ISBN
9781484293614 (electronic bk.)
1484293614 (electronic bk.)
1484293606
9781484293607
1484293614 (electronic bk.)
1484293606
9781484293607
Published
[United States] : Apress, 2023.
Language
English
Description
1 online resource (190 pages) : illustrations (black and white, and color).
Item Number
10.1007/978-1-4842-9361-4 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/2
Summary
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis Identify what information is in an email header Review header information and extract key indicators or patterns used for detection Identify signs of a suspicious or malicious email message Detect the tactics that attackers use in phishing emails Safely examine email links and attachments Use a variety of free and simple tools to analyze email messages.
Note
Includes index.
Access Note
Access limited to authorized users.
Source of Description
Description based on print version record.
Available in Other Form
Linked Resources
Record Appears in
Table of Contents
Chapter 1. How Email Works
Chapter 2. Phishing Tactics and Techniques
Chapter 3. PICERL Process explained
Chapter 4. Analyzing Message Content
Chapter 5. Links
Chapter 6. Attachments
Chapter 7. Log Searching and Response
Chapter 8. Remediation and Lessons Learned.
Chapter 2. Phishing Tactics and Techniques
Chapter 3. PICERL Process explained
Chapter 4. Analyzing Message Content
Chapter 5. Links
Chapter 6. Attachments
Chapter 7. Log Searching and Response
Chapter 8. Remediation and Lessons Learned.