| |
| |
Foreword | |
| |
| |
Acknowledgments | |
| |
| |
Introduction | |
| |
| |
| |
Challenges | |
| |
| |
| |
To Catch a Phish | |
| |
| |
Industry: Financial Services | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: Moderate | |
| |
| |
Mitigation Complexity: High | |
| |
| |
| |
Owning the Pharm | |
| |
| |
Industry: Pharmaceutical | |
| |
| |
Prevention Complexity: Low | |
| |
| |
Attack Complexity: High | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Big Bait, Big Phish | |
| |
| |
Industry: E-commerce | |
| |
| |
Prevention Complexity: Medium | |
| |
| |
Attack Complexity: Hard | |
| |
| |
Mitigation Complexity: Hard | |
| |
| |
| |
Shooting Phish in a Barrel | |
| |
| |
Industry: Public Relations | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: Moderate | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Too Few Secrets | |
| |
| |
Industry: Financial Services | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: Moderate | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Upgraded or "Owned?" | |
| |
| |
Industry: Internet Service Provider | |
| |
| |
Prevention Complexity: Medium | |
| |
| |
Attack Complexity: Low | |
| |
| |
Mitigation Complexity: High | |
| |
| |
| |
Pale Blue Glow | |
| |
| |
Industry: Banking and Finance | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: Easy | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Crossing the Line | |
| |
| |
Industry: Internet and Retail | |
| |
| |
Prevention Complexity: Medium | |
| |
| |
Attack Complexity: Medium | |
| |
| |
Mitigation Complexity: Medium to High | |
| |
| |
| |
The Root of the Problem | |
| |
| |
Industry: Publishing | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: Moderate | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Firewall Insights | |
| |
| |
Industry: Small Bank | |
| |
| |
Prevention Complexity: Medium | |
| |
| |
Attack Complexity: Low | |
| |
| |
Mitigation Complexity: High | |
| |
| |
| |
Peter LemonJello's "A Series of Unfortunate Events" | |
| |
| |
Industry: Finance | |
| |
| |
Prevention Complexity: Easy | |
| |
| |
Attack Complexity: Medium | |
| |
| |
Mitigation Complexity: Easy | |
| |
| |
| |
Share and Share Alike | |
| |
| |
Industry: Online Retail | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: Low | |
| |
| |
Mitigation Complexity: Low | |
| |
| |
| |
The Holy Grail | |
| |
| |
Industry: Financial | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: High | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Open Source | |
| |
| |
Industry: Small Business | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: Easy | |
| |
| |
Mitigation Complexity: Easy | |
| |
| |
| |
Cup of Chai | |
| |
| |
Industry: E-commerce | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: High | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Love Plus One | |
| |
| |
Industry: E-commerce | |
| |
| |
Prevention Complexity: Easy | |
| |
| |
Attack Complexity: Low | |
| |
| |
Mitigation Complexity: High | |
| |
| |
| |
Bullet the Blue Sky | |
| |
| |
Industry: E-commerce | |
| |
| |
Prevention Complexity: High | |
| |
| |
Attack Complexity: Hard | |
| |
| |
Mitigation Complexity: Easy | |
| |
| |
| |
The Insider III | |
| |
| |
Industry: Financial Institution | |
| |
| |
Prevention Complexity: Low | |
| |
| |
Attack Complexity: Low | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Jumping Someone Else's Train | |
| |
| |
Industry: Pharmaceutical | |
| |
| |
Prevention Complexity: Easy | |
| |
| |
Attack Complexity: Low | |
| |
| |
Mitigation Complexity: Low | |
| |
| |
| |
The Not-So-Usual Suspects | |
| |
| |
Industry: Financial | |
| |
| |
Prevention Complexity: Moderate | |
| |
| |
Attack Complexity: High | |
| |
| |
Mitigation Complexity: Moderate | |
| |
| |
| |
Solutions | |
| |
| |
| |
To Catch a Phish | |
| |
| |
| |
Owning the Pharm | |
| |
| |
| |
Big Bait, Big Phish | |
| |
| |
| |
Shooting Phish in a Barrel | |
| |
| |
| |
Too Few Secrets | |
| |
| |
| |
Upgraded or "Owned?" | |
| |
| |
| |
Pale Blue Glow | |
| |
| |
| |
Crossing the Line | |
| |
| |
| |
The Root of the Problem | |
| |
| |
| |
Firewall Insights | |
| |
| |
| |
Peter LemonJello's "A Series of Unfortunate Events" | |
| |
| |
| |
Share and Share Alike | |
| |
| |
| |
The Holy Grail | |
| |
| |
| |
Open Source | |
| |
| |
| |
Cup of Chai | |
| |
| |
| |
Love Plus One | |
| |
| |
| |
Bullet the Blue Sky | |
| |
| |
| |
The Insider III | |
| |
| |
| |
Jumping Someone Else's Train | |
| |
| |
| |
The Not-So-Usual Suspects | |
| |
| |
Index | |