Detecting and Combating Malicious Email

1st Edition

Authors: Julie Ryan Cade Kamachi
Paperback ISBN: 9780128001103
eBook ISBN: 9780128005460
Imprint: Syngress
Published Date: 10th October 2014
Page Count: 94
23.95 + applicable tax
18.99 + applicable tax
29.95 + applicable tax
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email.

Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.

Key Features

  • Discusses how and why malicious e-mail is used
  • Explains how to find hidden viruses in e-mails
  • Provides hands-on concrete steps to detect and stop malicious e-mail before it is too late
  • Covers what you need to do if a malicious e-mail slips through

Readership

Professionals in the fields of security awareness, business continuity, and risk management, as well as end users of email at all technical levels.

Table of Contents

  • Preface
  • Author Biographies
  • Technical Editor Biography
  • Chapter 1: Introduction
    • Abstract
    • A little history
    • Malicious electronic messaging—what is it?
  • Chapter 2: Types of Malicious Messages
    • Abstract
    • Feature types of malicious messages
    • Examples of malicious messages
  • Chapter 3: Thinking Like the Enemy
    • Abstract
  • Chapter 4: Inside Messaging: Making the Hidden Visible
    • Abstract
    • Email basics
    • The header
    • The message body
    • The attachments
    • Accessing the hidden material
  • Chapter 5: Steps in Detection
    • Abstract
    • Technology assistance
    • Configuration counts
  • Chapter 6: The Malicious Messaging Layered-Defense Framework
    • Abstract
    • Why use a layered-defense approach
  • Chapter 7: Final Thoughts
    • Abstract
  • Glossary

Details

No. of pages:
94
Language:
English
Copyright:
© Syngress 2015
Published:
Imprint:
Syngress
eBook ISBN:
9780128005460
Paperback ISBN:
9780128001103

About the Author

Julie Ryan

Julie Ryan is currently an Associate Professor and Chair of Engineering Management and Systems Engineering at George Washington University. Dr. Ryan began her career in the US Air Force as a signals intelligence officer after graduating from the Air Force Academy. She transitioned to civil service in the Defense Intelligence Agency as a military intelligence officer and later left government service to work in industry.. Dr. Ryan's research interests lie in information security and information warfare. She has authored or co-authored scholarly articles in such journals as IEEE Security and Privacy IEEE Transactions on Computers. She is also the co-author of Defending your Digital Assets published by McGraw-Hill

Affiliations and Expertise

Associate Professor and Chair of Engineering Management and Systems Engineering at George Washington University

Cade Kamachi