Skip to main content

Understanding Social Engineering Based Scams

  • Book
  • © 2016

Overview

  • Describes how scams manipulate human principles of persuasion
  • Suggests tools for measuring messaging credibility, campaign yields, and clustering and locations of scammers
  • Provides methods for identifying and stopping enterprise scams, such as the surging Business Email Compromise scam
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (12 chapters)

  1. Identifying Trends

  2. Why Do People Fall for Scams?

  3. Filtering Technology

  4. Understanding the Problem Starts with Measuring It

  5. Conclusion

Keywords

About this book



This book describes trends in email scams and offers tools and techniques

to identify such trends. It also describes automated countermeasures

based on an understanding of the type of persuasive methods used by

scammers. It reviews both consumer-facing scams and enterprise scams,

describing in-depth case studies relating to Craigslist scams and Business

Email Compromise Scams. This book provides a good starting point for

practitioners, decision makers and researchers in that it includes

alternatives and complementary tools to the currently deployed email

security tools, with a focus on understanding the metrics of scams.

Both professionals working in security and advanced-level students

interested in privacy or applications of computer science will find this book

a useful reference.



Reviews

“This up-to-date book zeroes in on the more recent phenomenon of lower volume, targeted emails. … It is directed at network administrators, security researchers, best policy practitioners, and law enforcers. … For the intended audiences, it is a decent high-level overview that is worth reading.” (David Bellin, Computing Reviews, February, 2017)

Editors and Affiliations

  • Agari, Portola Valley, USA

    Markus Jakobsson

About the editor

Dr. Markus Jakobsson is a leading voice in advising on advancements in understanding phishing, crimeware, social engineering and mobile security. He specializes in research around applied security, ranging from mobile malware detection to improved user interfaces, and with special attention to understanding and blocking fraud. Dr. Jakobsson has authored or co-authored more than a hundred peer-reviewed publications and numerous books related to Internet Security and Online Fraud. Dr. Jakobsson is the inventor of more than 50 patents and more than 100 pending patents, and consults as an expert witness in high-profile patent litigation cases. In 2013, Qualcomm acquired FatSkunk, an anti-malware startup founded by Dr. Jakobsson in 2009. He is the founder and CTO of ZapFraud Inc, a company dedicated to rubbing out Business Email Compromise.

Bibliographic Information

Publish with us