Skip to Main Content
Fighting Phishing
book

Fighting Phishing

by Roger A. Grimes
February 2024
Intermediate to advanced content levelIntermediate to advanced
448 pages
9h 22m
English
Wiley
Content preview from Fighting Phishing

CHAPTER 2Phishing Terminology and Examples

Chapter 2 will define dozens of terms used when discussing phishing-related events. It will include examples of many different types of phishing. My hope is that everyone, whether new to phishing or not, will walk away with a stronger base understanding of what's possible with social engineering and phishing.

Social Engineering

Let's revisit the definition of social engineering from Chapter 1, “Introduction to Social Engineering and Phishing.” As used in this book, social engineering is a malicious scam, where a perpetrator is often pretending to be someone else, a group, or a brand that the potential victim might implicitly trust more (than an unknown person), attempting to get the victim to perform an action that is contrary to their self-interests.

Phish

As discussed in Chapter 1, phishing is a type of criminal social engineering that involves online digital media. Phishing can happen in many different ways, including email (the most popular method), voice calls, in-person, websites, text messages, instant messaging, collaboration apps, and social media. Figure 2-1 is an example of a common type of phishing email.

A snapshot of a phishing email. It reads Netfix. Your subscription is about to expire. Update profile button is given below.

FIGURE 2-1 Example of a common type of phishing email.

In this example, a fake Netflix email is trying to get the potential victim's Netflix login credentials or credit card number. You can see that the originating ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity – Attack and Defense Strategies - Second Edition

Cybersecurity – Attack and Defense Strategies - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya
Critical Infrastructure Security

Critical Infrastructure Security

Soledad Antelada Toledano

Publisher Resources

ISBN: 9781394249206Purchase Link