Big Phish Little Phish

Authors

  • Kyle Bynum

Keywords:

Abstract

A cyber-attack is 201C;an attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm.201D;In the cyber realm there are many ways hackers go about getting personal information in an unauthorized way. In this research project I will be focusing totally on Phishing, how it works, some examples and how we can reduce phishing incidents. Phishing is a cyber security attack that uses email as a weapon. The process of phishing is when the email recipient believes that the message, they are sent is something they want or need. The attackers disguise themselves as a trusted entity of some kind making the recipient feel as if they are conversing with trustworthy person, or a company the victim might do business with. It's one of the oldest types of cyber attacks and it's still one of the most widespread and harmful. In my research I found that the F5 Lab of Artificial Threat Intelligence breaks down phishing into three distinct operations.

How to Cite

Kyle Bynum. (2020). Big Phish Little Phish. Global Journal of Computer Science and Technology, 20(H1), 37–39. Retrieved from https://computerresearch.org/index.php/computer/article/view/1962

Big Phish Little Phish

Published

2020-01-15