What is Phishing? - A Brief History of Phishing - The Costs to Society of Phishing - A Typical Phishing Attack - Phishing Example: America’s Credit Unions.
Types of Phishing Attacks - Deceptive Phishing - Malware-Based Phishing - DNS-Based Phishing (“Pharming”) - Content-Injection Phishing - Man-in-the-Middle Phishing - Search Engine Phishing
Email Spoofing - Filtering - Whitelisting and Greylisting - Anti-spam Proposals - User Education - IP Spoofing - IP Traceback - IP Spoofing Prevention - Intradomain Spoofing.
Malware - Viruses and Worms – Spyware - Adware - Browser Hijackers – Keyloggers - Trojan Horses – Rootkits - Session Hijackers.
Introduction - Human Behavior - Browser and Security Protocol Issues in the Human Context - Overview of the HCI and Security Literature - Understanding and Designing for Users - Understanding Users and Security - Designing Usable Secure Systems. Text Books:
Reference Book:
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks by Gunikhan Sonowal
Text Book:
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft by Markus Jakobsson, Steven Myers ISBN: 978-0-471-78245-2 December 2006