Студенческий сайт КФУ - ex ТНУ » Учебный раздел » Учебные файлы »СЕТЕВЫЕ ТЕХНОЛОГИИ

Detecting and Combating Malicious Email

Тип:
Категория: СЕТЕВЫЕ ТЕХНОЛОГИИ
Скачать
Купить


Название : Detecting and Combating Malicious Email
Автор : Cade Kamachi, Julie JCH Ryan
Издательство: Syngress
Год издания : 2014
Страниц: 94
Формат : pdf
Размер файла: 6,2 MB
Язык : English
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email.
Detecting and Combating Malicious Email
describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.
Discusses how and why malicious e-mail is used
Explains how to find hidden viruses in e-mails
Provides hands-on concrete steps to detect and stop malicious e-mail before it is too late
Covers what you need to do if a malicious e-mail slips through















Другие файлы:

E-Mail Security: A Pocket Guide
on't let an email cause an information security incident at your company - buy this pocket guide today! Your business relies on email for its everyday...

E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapte...

Web Application Defender's Cookbook
Provides practical tactics for detecting web attacks and malicious behavior and defending against them Written by a preeminent authority on web...

Metal Detecting: A Beginner's Guide to Mastering the Greatest Hobby In the World
There is an entire world of buried treasure right under our feet. This book shows you how to claim your share. Over 200 pages of valuable metal detect...

Computer Viruses and Malware
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger co...