Exploring the Stages of Phishing Attacks Computer Science Essay




A new, detailed anatomy of phishing, involving attack phases, attacker types, vulnerabilities, threats, targets, attack media, and attack techniques, is presented, which will help readers understand the process lifecycle of a phishing attack and increase awareness of these phishing attacks will increase. The techniques are: We believe that current anti-phishing solutions are useful, but insufficient, because phishers always use people's psychological weaknesses to design new types of phishing attacks. Several studies 3, 4 have already identified some of the above factors, but none of these have conducted a root cause analysis to enumerate a new, detailed anatomy of phishing, covering attack phases, types of attackers, vulnerabilities, threats, targets included. attack media and attack techniques are presented that will help readers understand the process lifecycle of a phishing attack and increase awareness of these phishing attacks and the techniques. Similarly, Jakobsson and Myers 2006 divide the phishing process with reference to the information flow of a phishing attack into basic, step-by-step phases, see Appendix F. These include preparing an attack, sending a malicious payload via a distribution vector such as a misleading email, which provokes the user's response. Phishing 29 is a type of attack that happens via an email that appears to come from a trusted source but has the bad motive of stealing sensitive data such as personal information, credit card details.





Please wait while your request is being verified...



78992604
55042770
23434140
46342660
18730808