Exploring the Stages of Phishing Attacks Computer Science Essay
A new, detailed anatomy of phishing, involving attack phases, attacker types, vulnerabilities, threats, targets, attack media, and attack techniques, is presented, which will help readers understand the process lifecycle of a phishing attack and increase awareness of these phishing attacks will increase. The techniques are: We believe that current anti-phishing solutions are useful, but insufficient, because phishers always use people's psychological weaknesses to design new types of phishing attacks. Several studies 3, 4 have already identified some of the above factors, but none of these have conducted a root cause analysis to enumerate a new, detailed anatomy of phishing, covering attack phases, types of attackers, vulnerabilities, threats, targets included. attack media and attack techniques are presented that will help readers understand the process lifecycle of a phishing attack and increase awareness of these phishing attacks and the techniques. Similarly, Jakobsson and Myers 2006 divide the phishing process with reference to the information flow of a phishing attack into basic, step-by-step phases, see Appendix F. These include preparing an attack, sending a malicious payload via a distribution vector such as a misleading email, which provokes the user's response. Phishing 29 is a type of attack that happens via an email that appears to come from a trusted source but has the bad motive of stealing sensitive data such as personal information, credit card details.