Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Understanding social engineering based scams
Jakobsson M., Springer International Publishing, New York, NY, 2016. 130 pp. Type: Book (978-1-493964-55-0)
Date Reviewed: Feb 9 2017

Though more properly titled as addressing email scams specifically, this up-to-date book zeroes in on the more recent phenomenon of lower volume, targeted emails. Correctly pointing out that messaging deception is probably as old as written communications, eight contributors, six content chapters, four case studies, and an introduction and conclusion all work coherently to present thoughtful information.

Part 1 has two chapters, on identifying trends and predicting trends in email scamming. Part 2 is a compelling chapter on social persuasion, outlining the various ways in which the targets (individuals) can be convinced to willingly participate.

Part 3 focuses on the many methods to select suspect emails, in other words, how to file email. I found the chapter on semantic analysis of messages most interesting, if the most intrusive and potentially prone to false positives.

Part 4 contains the book’s four case studies, which focus on sales, rentals, romances, and businesses. While I expected the case on romance to be the most titillating and perhaps sad, the approach feels to me somewhat bereft of human tragedy--“real people” never feel deep to me.

However, this text is not a novel. It is directed at network administrators, security researchers, best policy practitioners, and law enforcers. The competition to this book is thin (for example, [1,2]). It is not a fully comprehensive text, and does not directly cover prevalent industry approaches (namely domainkeys identified email (DKIM) and sender policy framework (SPF)), nor is it a full guide to the technologies that might be applicable. The references cited are skimpy, and the two-page index insufficient. For the intended audiences, it is a decent high-level overview that is worth reading.

More reviews about this item: Amazon

Reviewer:  David Bellin Review #: CR145054 (1705-0273)
1) Hadnagy, C.; Fincher, M.; Dreeke, R. Phishing dark waters: the offensive and defensive sides of malicious emails. Wiley, New York, NY, 2015.
2) Smith, B.; Hughes, A. Don't step in the trap: how to recognize and avoid email phishing scams. Createspace, North Charleston, SC, 2016.
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Web-Based Interaction (H.5.3 ... )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
 
Group And Organization Interfaces (H.5.3 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy