|
|
|
|
|
|
Date Reviewed |
|
|
1 - 5 of 5
reviews
|
|
|
|
|
|
|
|
The basics of hacking and penetration testing: ethical hacking and penetration testing made easy Engebretson P., Syngress Publishing, Waltham, MA, 2011. 180 pp. Type: Book (978-1-597496-55-1)
This is a book on the “dark side” of information technology, as it describes how the vulnerabilities of systems and networks can be exploited to gain unauthorized access. It is important that students and practition...
|
May 30 2012 |
|
|
|
|
|
|
Smartening the crowds: computational techniques for improving human verification to fight phishing scams Liu G., Xiang G., Pendleton B., Hong J., Liu W. SOUPS 2011 (Proceedings of the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA, Jul 20-22, 2011) 1-13, 2011. Type: Proceedings
A good phishing site should resemble the target site as much as possible, and it should hide the differences with the target site, at least to the unsuspecting user. This paper leverages this observation to cluster similar suspected ph...
|
Feb 9 2012 |
|
|
|
|
|
|
Privacy-preserving network forensics Afanasyev M., Kohno T., Ma J., Murphy N., Savage S., Snoeren A., Voelker G. Communications of the ACM 54(5): 78-87, 2011. Type: Article
The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is only loosely associated with a device, and is not associated with a person. This article proposes the use of group signatures to bind ...
|
Jul 18 2011 |
|
|
|
|
|
|
School of phish: a real-world evaluation of anti-phishing training Kumaraguru P., Cranshaw J., Acquisti A., Cranor L., Hong J., Blair M., Pham T. SOUPS 2009 (Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, CA, Jul 15-17, 2009) 1-12, 2009. Type: Proceedings
The well-designed “school of phish” experiment compares to what extent three groups, of about 170 participants each, fall for phishing scams. The control group received no training, one group was trained once, and t...
|
Jan 19 2010 |
|
|
|
|
|
|
Overcoming the insider: reducing employee computer crime through situational crime prevention Willison R., Siponen M. Communications of the ACM 52(9): 133-137, 2009. Type: Article
Situational crime prevention (SCP) is a criminological theory, proposed by Ronald Clarke in the 1980s and developed over the last 30 years, that focuses on the crime event rather than the criminal. A number of highly effective crime pr...
|
Nov 2 2009 |
|
|
|
|
|
|
|
|
|
|
|