did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781597490306

Phishing Exposed

by
  • ISBN13:

    9781597490306

  • ISBN10:

    159749030X

  • Format: Paperback
  • Copyright: 2006-01-06
  • Publisher: Elsevier Science
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.95 Save up to $1.65
  • Buy New
    $53.30
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information

Table of Contents

Foreword xvii
Banking On Phishing
1(36)
Introduction
2(1)
Spam Classification
3(5)
Spam Organization
3(4)
Classification Techniques
7(1)
Phishing
7(1)
Cyber-Crime Evolution
8(2)
What Is Phishing?
10(14)
What's Not a Phish
15(1)
Phishing Statistics
16(1)
E-Mail Effectiveness
17(7)
Fraud, Forensics, and the Law
24(7)
Phishing and the Law
24(1)
Spam, Spyware, and the Law
25(3)
Promising Antiphishing Legislation
28(1)
Technical Ramifications
29(1)
Legal Ramifications
29(2)
Summary
31(1)
Solutions Fast Track
32(2)
Frequently Asked Questions
34(3)
Go Phish!
37(48)
Introduction
38(2)
The Impersonation Attack
40(22)
The Mirror
40(5)
Setting Up the Phishing Server
45(4)
Setting Up the Blind Drop
49(4)
Preparing the Phishing E-Mail
53(5)
Preparing the Con
58(3)
Results
61(1)
The Forwarding Attack
62(7)
E-Mail Preparation
62(2)
The Phishing Server and the Blind Drop
64(1)
Preparing the Con
65(3)
Results
68(1)
The Popup Attack
69(12)
Setting Up the Phishing Server
70(4)
E-Mail Preparation
74(1)
Preparing the Con
75(5)
Results
80(1)
Summary
81(1)
Solutions Fast Track
82(1)
Frequently Asked Questions
83(2)
E-Mail: The Weapon of Mass Delivery
85(52)
Introduction
86(1)
E-Mail Basics
86(9)
E-Mail Headers
86(5)
Mail Delivery Process
91(4)
Anonymous E-Mail
95(13)
Forging Headers
98(2)
Open Relays and Proxy Servers
100(3)
Proxy Chaining, Onion Routing, and Mixnets
103(5)
Harvesting E-mail Addresses
108(12)
Harvesting Tools, Targets, and Techniques
108(11)
Hackers and Insiders
119(1)
Sending Spam
120(10)
The Tools of the Trade
120(4)
The Anti-Antispam
124(6)
Summary
130(1)
Solutions Fast Track
131(2)
Frequently Asked Questions
133(4)
Crossing the Phishing Line
137(78)
Introduction
138(73)
Quick Overview of the Web
138(1)
Dynamic HTML
139(1)
HyperText Transfer Protocol
139(1)
Request, and They Shall Respond
140(1)
HTTP Message Header Fields
141(6)
Status Codes
147(3)
Misplaced Trust
150(2)
Target: Redirects
152(37)
Target: Reflective Queries
189(15)
Target: Reflective Error Pages
204(7)
Summary
211(1)
Solutions Fast Track
212(1)
Frequently Asked Questions
213(2)
The Dark Side of the Web
215(94)
Introduction
216(1)
What Is Dynamic HTML, Really?
216(2)
When Features Become Flaws
218(42)
Careful with That Link, Eugene
223(5)
Evasive Tactics
228(6)
Patching Flat Tires
234(1)
Protect Yourself Against Fraud!
234(8)
Mixed Nuts
242(12)
The Code of Many Colors
254(6)
A Web Site Full of Secrets
260(41)
Cross-Site Request Forgery
261(1)
Session Riding
261(13)
Blind Faith
274(2)
Browser Botnets
276(18)
Attacking Yahoo! Domain Keys
294(7)
The Evolution of the Phisher
301(2)
Summary
303(1)
Solutions Fast Track
304(2)
Frequently Asked Questions
306(3)
Malware, Money Movers, and Ma Bell Mayhem!
309(38)
Introduction
310(1)
Mule Driving and Money Laundering
310(5)
How Phishers Set Up Shop
311(1)
The Process of Receiving the Money
312(2)
Western Union
314(1)
Mule Liability and Position
314(1)
U.S. Operations and Credit Cards
315(1)
Phishers Phone Home
315(10)
Defining Telecommunications Today
315(2)
SIP Overview
317(1)
SIP Communication
318(1)
Caller ID Spoofing
319(2)
SBC Network Takeover
321(3)
Anonymous Telephony
324(1)
Phreakin' Phishers!
324(1)
Slithering Scalability
325(17)
Malware in 2004
326(1)
Early 2004
326(1)
Mid-2004
327(1)
End of 2004
327(1)
Trojans of 2004
328(1)
Malware in 2005
329(1)
Malware Distribution Process
329(10)
Botnets
339(1)
Blind Drops
340(2)
The Phuture of Phishing
342(1)
Summary
343(1)
Solutions Fast Track
343(2)
Frequently Asked Questions
345(2)
So Long, and Thanks for All the Phish!
347(34)
Introduction
348(1)
Looking Back
348(4)
Legal Eagle
352(9)
Interagency Guidelines
352(5)
Results
357(2)
What About Spam?
359(2)
Antiphishing Vendors
361(6)
Stats to the Future
367(5)
Tracksploitation
372(5)
Stealing Their Network
373(4)
Send Me Phish!
377(1)
Summary
378(1)
Solutions Fast Track
378(2)
Frequently Asked Questions
380(1)
Index 381

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program