马上开始. 它是免费的哦
注册 使用您的电邮地址
Phishing 作者: Mind Map: Phishing

1. Human Factor

1.1. Social Engineering

1.2. Education

1.3. Warning massages and User interfaces

2. Relationship with...

2.1. Spam

2.2. Malware

3. Classification

3.1. Spare Phsing

3.2. Whaling

4. Response and Take down

5. Stakeholder

5.1. User

5.2. Goverments

5.3. Browsers Provider

5.3.1. Registrars

5.3.2. Non Profit Organizations

5.4. Law Enforcement

5.5. Service Provider

5.6. Internet service provider

6. Detection

6.1. Phishing Site Analysis

6.1.1. Server

6.1.2. Content

6.1.3. Uniform Resource Locator (URL)

6.2. Email Analysis

6.2.1. Content

6.2.1.1. Natural language processing

6.2.1.2. Sender Aunthintication

6.2.1.3. Machine Learning

6.2.1.4. Anomalies

6.2.2. Content + Behavioral

6.2.2.1. Privacy Concerns

6.3. Others vectors Analysis

6.3.1. Social Networks

6.3.2. IM

7. Economics and law

7.1. Incentives

7.2. Liability

7.3. False Positives