当前位置:网站首页>Phishing mail disposal
Phishing mail disposal
2022-07-29 06:35:00 【Zhongyun era - defense testable - Xiaoyu】
Phishing email found
The ways of discovery are as follows : Mail system abnormal login alarm 、 Employees report 、 Abnormal behavior alarm 、 Email honey bait alarm
It is recommended to access the intelligence data of Weibo or Qianxin . What happens to the content of the email URL Do a scan , You can find a lot of abnormal Links
Phishing mail disposal check items - FreeBuf Network security industry portal
Management
Block the sites involved in phishing email content in the office area 、URL visit
According to the actual situation of the office environment, you can manage online behavior 、 Router 、 Shielding on the switch
The content of the email involves domain name 、IP Should be shielded
To visit the intranet of phishing websites IP For recording , In order to trace the possible consequences of subsequent investigation
Block phishing emails
Block phishing email source email domain name
Block phishing email sources IP
If possible, it can be shielded according to the email content
Delete phishing messages that are not received by the client on the mail server
Users who receive phishing emails
Log backtracking according to the sender of phishing mail
In addition to checking how many people receive phishing emails , We also need to check whether the company's address book is leaked . use TOP500 The attack method of sending phishing emails by hitting the database with surnames is relatively simple compared with the subsequent protection . If it is found that the company's address book sequence is used, it is necessary to check the leakage time of the address book according to the resignation of the address book and the new employees . After all, targeted social work libraries are more powerful than TOP100、TOP500 Much larger
Notify users who have received phishing emails to process
Delete phishing messages
System encryption
Complete anti drug campaign
follow-up : Tracing to the source 、 Staff training to enhance safety awareness
边栏推荐
- 6898 changing matrix problem solution
- 子网数、主机数与子网掩码的关系
- Explain the difference between FIR filter and IIR filter in detail
- Vivado IP核之浮点数开方 Floating-point
- Vivado IP核之定点数转为浮点数Floating-point
- 通过os-shell引发的mysql拿shell的思考
- 什么是DNS放大攻击
- Self study understanding of [chain forward star]
- MerkleTree 构建QT实现UI
- 黑客攻击入侵服务器的6种常见方式
猜你喜欢

MerkleTree 构建QT实现UI

day04_数组

day12_多线程

NoClassDefFoundError processing

Navicat for Oracle Cannot create oci environment

Access、Hybrid和Trunk三种模式的理解

【面试题】2022年最新软件测试面试题(400道)【附带答案】持续更新...

day03_1_流程控制

Software testing career development: where should software testers go
![[leetcode skimming] array 1 - double pointer](/img/c3/a671395e20fad58f1c7f6abc6e1a39.png)
[leetcode skimming] array 1 - double pointer
随机推荐
Self study understanding of [chain forward star]
子网数、主机数与子网掩码的关系
2022 summer second day information competition learning achievement sharing 2
基于udp通信的在线多人聊天室
Noi online 2022 popular group problem solving & personal understanding
Ue5 landscape conversion Nanite conversion method and it does not support the use method of starting dynamic mesh with lumen and lumen
基于FPGA的4位减法器设计及仿真代码
通过os-shell引发的mysql拿shell的思考
Unity初学3——敌人的移动控制和掉血区域的设置(2d)
一文看懂网络安全五年之巨变
网络安全学习(一)
2022 summer second day information competition learning achievement sharing 1
day15_泛型
进程与线程
Arrays&Object&System&Math&Random&包装类
九、 组网技术
day16-集合上
详解FIR滤波器和IIR滤波器的区别
2022年的软件测试的岗位要求为何越来越高?这其中有什么不可告人的秘密吗?
网站受DDoS攻击的表现以及查看方法