Muutke küpsiste eelistusi

Detecting and Combating Malicious Email [Pehme köide]

, (Associate Professor and Chair of Engineering Management and Systems Engineering at George Washington University)
  • Formaat: Paperback / softback, 94 pages, kõrgus x laius: 229x152 mm, kaal: 320 g
  • Ilmumisaeg: 22-Oct-2014
  • Kirjastus: Syngress Media,U.S.
  • ISBN-10: 0128001100
  • ISBN-13: 9780128001103
Teised raamatud teemal:
  • Formaat: Paperback / softback, 94 pages, kõrgus x laius: 229x152 mm, kaal: 320 g
  • Ilmumisaeg: 22-Oct-2014
  • Kirjastus: Syngress Media,U.S.
  • ISBN-10: 0128001100
  • ISBN-13: 9780128001103
Teised raamatud teemal:
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.Discusses how and why malicious e-mail is usedExplains how to find hidden viruses in e-mailsProvides hands-on concrete steps to detect and stop malicious e-mail before it is too lateCovers what you need to do if a malicious e-mail slips through

Muu info

Learn how to protect yourself from dangerous email-based attacks.
Preface vii
Author Biographies ix
Technical Editor Biography xi
Chapter 1 Introduction
1(10)
A Little History
2(3)
Malicious Electronic Messaging---What is it?
5(6)
Chapter 2 Types of Malicious Messages
11(26)
Feature Types of Malicious Messages
14(3)
Examples of Malicious Messages
17(20)
Chapter 3 Thinking Like the Enemy
37(6)
Chapter 4 Inside Messaging: Making the Hidden Visible
43(12)
Email Basics
43(1)
The Header
44(3)
The Message Body
47(3)
The Attachments
50(2)
Accessing the Hidden Material
52(3)
Chapter 5 Steps in Detection
55(16)
Technology Assistance
63(3)
Configuration Counts
66(5)
Chapter 6 The Malicious Messaging Layered-Defense Framework
71(10)
Why use a Layered-Defense Approach
71(10)
Chapter 7 Final Thoughts
81(2)
Glossary 83
Julie Ryan is currently an Associate Professor and Chair of Engineering Management and Systems Engineering at George Washington University. Dr. Ryan began her career in the US Air Force as a signals intelligence officer after graduating from the Air Force Academy. She transitioned to civil service in the Defense Intelligence Agency as a military intelligence officer and later left government service to work in industry.. Dr. Ryan's research interests lie in information security and information warfare. She has authored or co-authored scholarly articles in such journals as IEEE Security and Privacy IEEE Transactions on Computers. She is also the co-author of Defending your Digital Assets published by McGraw-Hill