Phishing and countermeasures : understanding the increasing problem of electronic identity theft /
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resource...
Saved in:
Other Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, N.J. :
Wiley-Interscience,
©2007.
|
Subjects: | |
Online Access: | CONNECT |
Table of Contents:
- 1. Introduction to phishing
- 2. Phishing attacks : information flow and chokepoints
- 3. Spoofing and counter measures
- 4. Pharming and client side attacks
- 5. Status quo security tools
- 6. Adding context to phishing attacks : spear phishing
- 7. Human-centered design considerations
- 8. Passwords
- 9 . Mutual authentication and trusted pathways
- 10. Biometrics and authentication
- 11. Making takedown difficult
- 12. Protecting browser state
- 13. Browser toolbars
- 14. Social networks
- 15. Microsoft's anti-phishing technologies and tactics
- 16. Using S/MIME
- 17. Experimental evaluation of attacks and countermeasure s-- 18. Liability for phishing
- 19. The future.