The death of the internet /

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, th...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Άλλοι συγγραφείς: Jakobsson, Markus
Μορφή: Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Hoboken : John Wiley & Sons, [2012]
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06286nam a2200793 4500
001 ocn799768467
003 OCoLC
005 20170124072332.2
006 m o d
007 cr cnu---unuuu
008 120716s2012 nju ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d DG1  |d YDXCP  |d N$T  |d CDX  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d TEFOD  |d OCLCF  |d DEBSZ  |d OCLCO  |d OCLCQ  |d IEEEE  |d TEFOD  |d OCLCQ  |d DG1  |d GrThAP 
019 |a 805071189  |a 858699726 
020 |a 9781118312551  |q (electronic bk.) 
020 |a 1118312554  |q (electronic bk.) 
020 |a 9781118312537  |q (electronic bk.) 
020 |a 1118312538  |q (electronic bk.) 
020 |z 1118062418 
020 |z 9781118062418 
024 8 |a 9786613770028 
029 1 |a AU@  |b 000049858911 
029 1 |a DEBSZ  |b 397235429 
029 1 |a NZ1  |b 14695013 
029 1 |a NZ1  |b 15340854 
035 |a (OCoLC)799768467  |z (OCoLC)805071189  |z (OCoLC)858699726 
037 |a 377002  |b MIL 
037 |a 34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.875.I57  |b .J34 2012 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
084 |a COM053000  |2 bisacsh 
049 |a MAIN 
245 0 4 |a The death of the internet /  |c edited by Markus Jakobsson. 
264 1 |a Hoboken :  |b John Wiley & Sons,  |c [2012] 
264 4 |c ©2012 
300 |a 1 online resource (387 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a THE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet. 
505 8 |a 3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion. 
505 8 |a 3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail. 
505 8 |a 4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here? 
505 8 |a 4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure. 
500 |a 4.4.3 The Domain. 
520 |a Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, l. 
504 |a Includes bibliographical references. 
588 0 |a Print version record. 
650 0 |a Internet  |x Security measures. 
650 0 |a Electronic commerce  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Computer crimes. 
650 4 |a Electrical engineering. 
650 4 |a Engineering. 
650 4 |a Computer science. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Electronic commerce  |x Security measures.  |2 fast  |0 (OCoLC)fst00906919 
650 7 |a Internet  |x Security measures.  |2 fast  |0 (OCoLC)fst01751426 
655 4 |a Electronic books. 
700 1 |a Jakobsson, Markus. 
776 0 8 |i Print version:  |z 9786613770028  |w (DLC) 2011047198 
856 4 0 |u https://doi.org/10.1002/9781118312551  |z Full Text via HEAL-Link 
994 |a 92  |b DG1