Book description
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email.
Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.
- Discusses how and why malicious e-mail is used
- Explains how to find hidden viruses in e-mails
- Provides hands-on concrete steps to detect and stop malicious e-mail before it is too late
- Covers what you need to do if a malicious e-mail slips through
Table of contents
- Cover
- Title page
- Copyright
- Preface
- Author Biographies
- Technical Editor Biography
- Chapter 1: Introduction
- Chapter 2: Types of Malicious Messages
- Chapter 3: Thinking Like the Enemy
- Chapter 4: Inside Messaging: Making the Hidden Visible
- Chapter 5: Steps in Detection
- Chapter 6: The Malicious Messaging Layered-Defense Framework
- Chapter 7: Final Thoughts
- Glossary
Product information
- Title: Detecting and Combating Malicious Email
- Author(s):
- Release date: October 2014
- Publisher(s): Syngress
- ISBN: 9780128005460
You might also like
book
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
book
Information Security Policies, Procedures, and Standards
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to …
book
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This …