1 option
Detecting and combating malicious email / Julie JCH Ryan, Cade Kamachi.
- Format:
- Book
- Author/Creator:
- Ryan, Julie J. C. H., author.
- Kamachi, Cade, author.
- Language:
- English
- Subjects (All):
- Business communication.
- Electronic mail messages.
- Physical Description:
- 1 online resource (96 p.)
- Edition:
- 1st edition
- Place of Publication:
- Waltham, Massachusetts : Syngress, 2015.
- Language Note:
- English
- System Details:
- text file
- Summary:
- Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The educa
- Contents:
- Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 - Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 - Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 - Thinking Like the Enemy
- Chapter 4 - Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 - Steps in Detection; Technology assistance; Configuration counts; Chapter 6 - The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 - Final Thoughts; Glossary
- Notes:
- Description based upon print version of record.
- Description based on print version record.
- ISBN:
- 0-12-800546-7
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.