Home > Computing and Information Technology > Computer networking and communications > Network security > Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
29%
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing.

Table of Contents:
Introduction xiii Part I Introduction to Social Engineering Security 1 Chapter 1 Introduction to Social Engineering and Phishing 3 What Are Social Engineering and Phishing? 3 How Prevalent Are Social Engineering and Phishing? 8 Chapter 2 Phishing Terminology and Examples 23 Social Engineering 23 Phish 24 Well- Known Brands 25 Top Phishing Subjects 26 Stressor Statements 27 Malicious Downloads 30 Malware 31 Bots 31 Downloader 32 Account Takeover 32 Spam 33 Spear Phishing 34 Whaling 35 Page Hijacking 35 SEO Pharming 36 Calendar Phishing 38 Social Media Phishing 40 Romance Scams 41 Vishing 44 Pretexting 46 Open- Source Intelligence 47 Callback Phishing 47 Smishing 49 Business Email Compromise 51 Sextortion 53 Browser Attacks 53 Baiting 56 QR Phishing 56 Phishing Tools and Kits 57 Summary 59 Chapter 3 3x3 Cybersecurity Control Pillars 61 The Challenge of Cybersecurity 61 Compliance 62 Risk Management 65 Defense-In-Depth 68 3x3 Cybersecurity Control Pillars 70 Summary 72 Part II Policies 73 Chapter 4 Acceptable Use and General Cybersecurity Policies 75 Acceptable Use Policy (AUP) 75 General Cybersecurity Policy 79 Summary 88 Chapter 5 Anti-Phishing Policies 89 The Importance of Anti-Phishing Policies 89 What to Include 90 Summary 109 Chapter 6 Creating a Corporate SAT Policy 111 Getting Started with Your SAT Policy 112 Necessary SAT Policy Components 112 Example of Security Awareness Training Corporate Policy 128 Acme Security Awareness Training Policy: Version 2.1 128 Summary 142 Part III Technical Defenses 145 Chapter 7 DMARC, SPF, and DKIM 147 The Core Concepts 147 A US and Global Standard 149 Email Addresses 151 Sender Policy Framework (SPF) 159 Domain Keys Identified Mail (DKIM) 165 Domain- based Message Authentication, Reporting, and Conformance (DMARC) 169 Configuring DMARC, SPF, and DKIM 174 Putting It All Together 175 DMARC Configuration Checking 176 How to Verify DMARC Checks 177 How to Use DMARC 179 What DMARC Doesn’t Do 180 Other DMARC Resources 181 Summary 182 Chapter 8 Network and Server Defenses 185 Defining Network 186 Network Isolation 187 Network-Level Phishing Attacks 187 Network- and Server-Level Defenses 190 Summary 214 Chapter 9 Endpoint Defenses 217 Focusing on Endpoints 217 Anti- Spam and Anti- Phishing Filters 218 Anti- Malware 218 Patch Management 218 Browser Settings 219 Browser Notifications 223 Email Client Settings 225 Firewalls 227 Phishing- Resistant MFA 227 Password Managers 228 VPNs 230 Prevent Unauthorized External Domain Collaboration 231 DMARC 231 End Users Should Not Be Logged on as Admin 232 Change and Configuration Management 232 Mobile Device Management 233 Summary 233 Chapter 10 Advanced Defenses 235 AI- Based Content Filters 235 Single-Sign-Ons 237 Application Control Programs 237 Red/Green Defenses 238 Email Server Checks 242 Proactive Doppelganger Searches 243 Honeypots and Canaries 244 Highlight New Email Addresses 246 Fighting USB Attacks 247 Phone- Based Testing 249 Physical Penetration Testing 249 Summary 250 Part IV Creating a Great Security Awareness Program 251 Chapter 11 Security Awareness Training Overview 253 What Is Security Awareness Training? 253 Goals of SAT 256 Senior Management Sponsorship 260 Absolutely Use Simulated Phishing Tests 260 Different Types of Training 261 Compliance 274 Localization 274 SAT Rhythm of the Business 275 Reporting/Results 277 Checklist 277 Summary 278 Chapter 12 How to Do Training Right 279 Designing an Effective Security Awareness Training Program 280 Building/Selecting and Reviewing Training Content 295 Additional References 303 Summary 304 Chapter 13 Recognizing Rogue URLs 305 How to Read a URL 305 Most Important URL Information 313 Rogue URL Tricks 315 Summary 334 Chapter 14 Fighting Spear Phishing 335 Background 335 Spear Phishing Examples 337 How to Defend Against Spear Phishing 345 Summary 347 Chapter 15 Forensically Examining Emails 349 Why Investigate? 349 Why You Should Not Investigate 350 How to Investigate 351 Examining Emails 352 Clicking on Links and Running Malware 373 Submit Links and File Attachments to AV 374 The Preponderance of Evidence 375 A Real- World Forensic Investigation Example 376 Summary 378 Chapter 16 Miscellaneous Hints and Tricks 379 First- Time Firing Offense 379 Text- Only Email 381 Memory Issues 382 SAT Counselor 383 Annual SAT User Conference 384 Voice- Call Tests 385 Credential Searches 385 Dark Web Searches 386 Social Engineering Penetration Tests 386 Ransomware Recovery 387 Patch, Patch, Patch 387 CISA Cybersecurity Awareness Program 388 Passkeys 388 Avoid Controversial Simulated Phishing Subjects 389 Practice and Teach Mindfulness 392 Must Have Mindfulness Reading 393 Summary 393 Chapter 17 Improving Your Security Culture 395 What Is a Security Culture? 396 Seven Dimensions of a Security Culture 397 Improving Security Culture 401 Other Resources 404 Summary 404 Conclusion 405 Acknowledgments 407 About the Author 411 Index 413


Best Sellers


Product Details
  • ISBN-13: 9781394249206
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 229 mm
  • No of Pages: 448
  • Spine Width: 28 mm
  • Weight: 476 gr
  • ISBN-10: 1394249209
  • Publisher Date: 15 Feb 2024
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Sub Title: Everything You Can Do to Fight Social Engineering and Phishing
  • Width: 152 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
John Wiley & Sons Inc -
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA