Thanks to visit codestin.com
Credit goes to link.springer.com

Skip to main content
Apress

How to Catch a Phish

A Practical Guide to Detecting Phishing Emails

  • Book
  • © 2023

Overview

  • Provides a step-by-step process to determine the legitimacy or risk associated with a particular email message
  • Helps you identify suspicious emails and defend your networks
  • Shows you how to analyze message content and identify key phishing message indicators
  • 5241 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook GBP 19.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book GBP 24.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.

Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change.

Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely.

This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity.

You Will Learn How to:

  • Safely save email messages as attachments for analysis
  • Identify what information is in an email header
  • Review header information and extract key indicators or patterns used for detection
  • Identify signs of a suspicious or malicious email message
  • Detect the tactics that attackers use in phishing emails
  • Safely examine email links and attachments
  • Use a variety of free and simple tools to analyze email messages

Who This Book Is For

Cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.


Similar content being viewed by others

Table of contents (8 chapters)

Authors and Affiliations

  • Severn, USA

    Nicholas Oles

About the author

Nick Oles is a cybersecurity expert with over 15 years of operational experience in military, industry, and academic environments. He has worked on incident response and threat hunting teams and consulted with Fortune 150 organizations, small businesses, and US Department of Defense entities. Nick has served his country for over a decade in the cyber and special operations communities, earning multiple military accolades, completing worldwide deployments, and serving in joint special operations environments. He has advised award-winning academic centers on cyber-program development and management, as well as created and taught academic and certification courses on a variety of cybersecurity topics. Nick has detected, analyzed, and responded to thousands ofsecurity incidents over his career. He continues to actively contribute to the cybersecurity community and teach students at all skill levels while still serving his country.

Accessibility Information

PDF accessibility summary

This PDF does not fully comply with PDF/UA standards, but does feature limited screen reader support, described non-text content (images, graphs), bookmarks for easy navigation and searchable, selectable text. Users of assistive technologies may experience difficulty navigating or interpreting content in this document. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at [email protected].

EPUB accessibility summary

This ebook is designed with accessibility in mind, aiming to meet the ePub Accessibility 1.0 AA and WCAG 2.0 Level AA standards. Its features include descriptions for images and other non-text content, as well as rich navigation that is compatible with screen readers. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at [email protected].

Bibliographic Information

  • Book Title: How to Catch a Phish

  • Book Subtitle: A Practical Guide to Detecting Phishing Emails

  • Authors: Nicholas Oles

  • DOI: https://doi.org/10.1007/978-1-4842-9361-4

  • Publisher: Apress Berkeley, CA

  • eBook Packages: Professional and Applied Computing, Apress Access Books, Professional and Applied Computing (R0)

  • Copyright Information: Nicholas Oles 2023

  • Softcover ISBN: 978-1-4842-9360-7Published: 21 June 2023

  • eBook ISBN: 978-1-4842-9361-4Published: 20 June 2023

  • Edition Number: 1

  • Number of Pages: XI, 147

  • Number of Illustrations: 3 b/w illustrations, 88 illustrations in colour

  • Topics: Systems and Data Security

Keywords

Publish with us