eBooks-it.org Logo
eBooks-IT.org Inner Image

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email Image

Book Details:

Publisher:Syngress Media,U.S.
Series: Syngress
Author:Julie Ryan
Edition:1
ISBN-10:0128001100
ISBN-13:9780128001103
Pages:94
Published:Oct 10 2014
Posted:Apr 16 2016
Language:English
Book format:PDF
Book size:8.2 MB

Book Description:

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments. It discusses how and why malicious e-mail is used. It explains how to find hidden viruses in e-mails. It provides hands-on concrete steps to detect and stop malicious e-mail before it is too late. It covers what you need to do if a malicious e-mail slips through.

Download Link:

Related Books:

Hacking Web Apps

Detecting and Preventing Web Application Security Problems
Hacking Web Apps Image
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: . SQL Injection . Cross Site Scripting . Logic Attacks . Server Misconfigurations . Predictable Pages . Web of Distrust . Breaking Authentication Schemes . ...

Insider Computer Fraud

An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud Image
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud. Drawing from the authors vast experience assessing the adequacy of IT security for the banking and securities industries, the book presents a practical framework for identifying, measuring, monitoring, and controlli...

Malware Forensics

Investigating and Analyzing Malicious Code
Malware Forensics Image
Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physic...



2007 - 2017 © eBooks-IT.org