Phishing for Answers
portes grátis
Phishing for Answers
Risk identification and mitigation strategies
Shaw, Lawrence E.; Merz, Terry R.
Institution of Engineering and Technology
11/2024
342
Dura
9781839536670
15 a 20 dias
Descrição não disponível.
Chapter 1: The phish: an introduction to the nature of phishing
Chapter 2: The user and context
Chapter 3: The technology comfort experience
Chapter 4: Failing to regulate the ascriptions of threats/vulnerability knowledge to technology
Chapter 5: Assessing the phishing risk
Chapter 6: The organization is at risk: start where you are
Chapter 7: Training efficacy versus direct experience and introspection
Chapter 8: Addressing social media presence
Chapter 9: Technology solutions
Chapter 10: Case studies
Chapter 11: Conclusions
Chapter 2: The user and context
Chapter 3: The technology comfort experience
Chapter 4: Failing to regulate the ascriptions of threats/vulnerability knowledge to technology
Chapter 5: Assessing the phishing risk
Chapter 6: The organization is at risk: start where you are
Chapter 7: Training efficacy versus direct experience and introspection
Chapter 8: Addressing social media presence
Chapter 9: Technology solutions
Chapter 10: Case studies
Chapter 11: Conclusions
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
anti-phishing; cybersecurity; security; information security; social engineering; cyber-attack; phishing attack; deepfake; audio manipulation; video manipulation; spear-phishing; phishing countermeasures; cyber forensics; incident response; network security; infrastructure security; artificial intelligence; AI
Chapter 1: The phish: an introduction to the nature of phishing
Chapter 2: The user and context
Chapter 3: The technology comfort experience
Chapter 4: Failing to regulate the ascriptions of threats/vulnerability knowledge to technology
Chapter 5: Assessing the phishing risk
Chapter 6: The organization is at risk: start where you are
Chapter 7: Training efficacy versus direct experience and introspection
Chapter 8: Addressing social media presence
Chapter 9: Technology solutions
Chapter 10: Case studies
Chapter 11: Conclusions
Chapter 2: The user and context
Chapter 3: The technology comfort experience
Chapter 4: Failing to regulate the ascriptions of threats/vulnerability knowledge to technology
Chapter 5: Assessing the phishing risk
Chapter 6: The organization is at risk: start where you are
Chapter 7: Training efficacy versus direct experience and introspection
Chapter 8: Addressing social media presence
Chapter 9: Technology solutions
Chapter 10: Case studies
Chapter 11: Conclusions
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
anti-phishing; cybersecurity; security; information security; social engineering; cyber-attack; phishing attack; deepfake; audio manipulation; video manipulation; spear-phishing; phishing countermeasures; cyber forensics; incident response; network security; infrastructure security; artificial intelligence; AI