000761266 000__ 05411cam\a2200517Ma\4500 000761266 001__ 761266 000761266 005__ 20230306142147.0 000761266 006__ m\\\\\o\\d\\\\\\\\ 000761266 007__ cr\cn\nnnunnun 000761266 008__ 160917s2016\\\\nyu\\\\\o\\\\\001\0\eng\d 000761266 019__ $$a958482404$$a958780272 000761266 020__ $$a9781493964574$$q(electronic book) 000761266 020__ $$a1493964577$$q(electronic book) 000761266 020__ $$z1493964550 000761266 020__ $$z9781493964550 000761266 035__ $$aSP(OCoLC)ocn958583074 000761266 035__ $$aSP(OCoLC)958583074$$z(OCoLC)958482404$$z(OCoLC)958780272 000761266 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dN$T$$dYDX$$dGW5XE$$dIDEBK$$dDKU$$dOCLCQ 000761266 049__ $$aISEA 000761266 050_4 $$aHE7551 000761266 050_4 $$aQA75.5-76.95 000761266 08204 $$a004.692$$223 000761266 08204 $$a004 000761266 24500 $$aUnderstanding social engineering based scams /$$cMarkus Jakobsson, editor. 000761266 260__ $$aNew York, NY :$$bSpringer,$$c2016. 000761266 300__ $$a1 online resource (135 pages) 000761266 336__ $$atext$$btxt$$2rdacontent 000761266 337__ $$acomputer$$bc$$2rdamedia 000761266 338__ $$aonline resource$$bcr$$2rdacarrier 000761266 500__ $$aIncludes index. 000761266 5050_ $$aAbout the Editor and Contributors; Contributors; Contributor Bios; Contents; An Overview of the Scam Problem ; About Scams and This Book; About This Book; References; 1 Scams and Targeting; 1.1 Yields and Targeting; 1.2 Understanding Yields and Trends; References; Part I Identifying Trends; 2 Identifying Scams and Trends; 2.1 Gathering Hundreds of Thousands of Scam Messages; 2.2 Taxonomy of Scam Emails; 2.2.1 Non-Targeted Scams; 2.2.2 Targeted Scams; 2.2.3 Scams that Are Both Non-targeted and Targeted; 2.2.4 Miscellaneous Scams; 2.3 Scam Classification; 2.4 Scam Trends. 000761266 5058_ $$a2.4.1 Targeted vs. Non-Targeted Scams2.4.2 Scams on the Rise; 2.4.3 Scams in Decline; References; 3 Predicting Trends; 3.1 Vulnerabilities Point to Trends; 3.2 Measuring Credibility; References; Part II Why Do People Fall for Scams?; 4 Persuasion in Scams; 4.1 Persuasion in Emails; 4.2 Principles of Persuasion; 4.2.1 Principles of Persuasion in Scam Categories; 4.2.2 Scam Terms: Trends and Persuasion; 4.2.3 Comparison Between Scam and Legitimate Term Trends; References; Part III Filtering Technology; 5 Traditional Countermeasures to Unwanted Email; 5.1 The History of Spam. 000761266 5058_ $$a5.2 Anti-Spam Landscape5.3 Content-Based Spam Filtering; 5.4 Blacklisting Approaches; 5.5 Anti-Spoofing Approaches; 5.5.1 DKIM; 5.5.2 SPF; 5.5.3 DMARC; References; 6 Obfuscation in Spam and Scam; 6.1 Confusable Characters and Homograph Scam Attacks; 6.2 How to Test the Attack; 6.3 Detecting Obfuscated Scam; References; 7 Semantic Analysis of Messages; 7.1 Example: Stranded Traveler Scams; 7.2 Detecting Storylines; 7.3 Detecting Brand Abuse; Part IV Understanding the Problem Starts with Measuring It; 8 Case Study: Sales Scams; 8.1 The Automated Honeypot Ad System; 8.1.1 Magnetic Honeypot Ads. 000761266 5058_ $$a8.1.2 Automated Communication with Scammers8.2 Automated Scammer Interaction; 8.3 Where Are the Scammers?; 8.3.1 Collected Emails and Threads; 8.3.2 IP Addresses; 8.3.3 Email Accounts; 8.3.4 Shipping Addresses and Phone Numbers; 8.3.5 Attribution: Performing Scammer Group Classification; 8.4 Discussion; 9 Case Study: Rental Scams; 9.1 Dataset; 9.1.1 Rental Listing Crawling; 9.1.2 Campaign Identification; 9.1.3 Campaign Expansion Phase: Latitudinal; 9.1.4 Campaign Expansion Phase: Longitudinal; 9.1.5 Campaign Summaries; 9.2 Credit Report Rental Scams; 9.2.1 Data Collection. 000761266 5058_ $$a9.2.2 Dataset Sanity Check9.2.3 Two-Scams-in-One; 9.2.4 In-Depth Analysis; 9.3 Clone Scams; 9.3.1 Data Collection; 9.3.2 In-Depth Analysis of Confirmed Scams; 9.4 Realtor Service Scams; 9.4.1 Data Collection; 9.4.2 American Standard Online; 9.4.3 New Line Equity; 9.4.4 Search Rent to Own; 9.5 Flagged Ad Analysis; References; 10 Case Study: Romance Scams; 10.1 Romance Scams: A Hurtful Crime; 10.2 Collecting Intelligence; 10.3 Romance Scam Taxonomy; 10.3.1 Traditional Romance Scam; 10.3.2 Affiliate Marketing Scam; 10.3.3 Phone Scam; 10.3.4 Simulated Spam Filter Results; 10.4 Filtering Insights. 000761266 506__ $$aAccess limited to authorized users. 000761266 520__ $$aThis book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference. 000761266 588__ $$aDescription based on print version record. 000761266 650_0 $$aSpam (Electronic mail) 000761266 650_0 $$aFraud. 000761266 7001_ $$aJakobsson, Markus. 000761266 77608 $$iPrint version:$$aJakobsson, Markus.$$tUnderstanding Social Engineering Based Scams.$$dNew York, NY : Springer New York, ©2016$$z9781493964550 000761266 852__ $$bebk 000761266 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4939-6457-4$$zOnline Access$$91397441.1 000761266 909CO $$ooai:library.usi.edu:761266$$pGLOBAL_SET 000761266 980__ $$aEBOOK 000761266 980__ $$aBIB 000761266 982__ $$aEbook 000761266 983__ $$aOnline 000761266 994__ $$a92$$bISE