Detecting and combating malicious email

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a maliciou...

Descripción completa

Detalles Bibliográficos
Otros Autores: Ryan, Julie J. C. H., author (author), Kamachi, Cade, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Massachusetts : Syngress 2015.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628701606719
Tabla de Contenidos:
  • Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 - Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 - Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 - Thinking Like the Enemy
  • Chapter 4 - Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 - Steps in Detection; Technology assistance; Configuration counts; Chapter 6 - The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 - Final Thoughts; Glossary