29,95 €
Versandkostenfrei per Post / DHL
Aktuell nicht verfügbar
Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change.
Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely.
This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity.
Identify what information is in an email header
Review header information and extract key indicators or patterns used for detection
Identify signs of a suspicious or malicious email message
Detect the tactics that attackers use in phishing emails
Safely examine email links and attachments
Use a variety of free and simple tools to analyze email messages
Who This Book Is For
Cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.
Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change.
Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely.
This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity.
Identify what information is in an email header
Review header information and extract key indicators or patterns used for detection
Identify signs of a suspicious or malicious email message
Detect the tactics that attackers use in phishing emails
Safely examine email links and attachments
Use a variety of free and simple tools to analyze email messages
Who This Book Is For
Cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.
Provides a step-by-step process to determine the legitimacy or risk associated with a particular email message
Helps you identify suspicious emails and defend your networks
Shows you how to analyze message content and identify key phishing message indicators
Chapter 1. How Email Works.- Chapter 2. Phishing Tactics and Techniques.- Chapter 3. PICERL Process explained.- Chapter 4. Analyzing Message Content.- Chapter 5. Links.- Chapter 6. Attachments.- Chapter 7. Log Searching and Response.- Chapter 8. Remediation and Lessons Learned.
| Erscheinungsjahr: | 2023 |
|---|---|
| Genre: | Importe, Informatik |
| Rubrik: | Naturwissenschaften & Technik |
| Medium: | Taschenbuch |
| Inhalt: |
xi
147 S. 3 s/w Illustr. 88 farbige Illustr. 147 p. 91 illus. 88 illus. in color. |
| ISBN-13: | 9781484293607 |
| ISBN-10: | 1484293606 |
| Sprache: | Englisch |
| Einband: | Kartoniert / Broschiert |
| Autor: | Oles, Nicholas |
| Auflage: | First Edition |
| Hersteller: |
Apress
Apress L.P. |
| Verantwortliche Person für die EU: | APress in Springer Science + Business Media, Heidelberger Platz 3, D-14197 Berlin, juergen.hartmann@springer.com |
| Maße: | 235 x 155 x 9 mm |
| Von/Mit: | Nicholas Oles |
| Erscheinungsdatum: | 21.06.2023 |
| Gewicht: | 0,254 kg |