Big Phish Little Phish
Keywords:
Abstract
A cyber-attack is 201C;an attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm.201D;In the cyber realm there are many ways hackers go about getting personal information in an unauthorized way. In this research project I will be focusing totally on Phishing, how it works, some examples and how we can reduce phishing incidents. Phishing is a cyber security attack that uses email as a weapon. The process of phishing is when the email recipient believes that the message, they are sent is something they want or need. The attackers disguise themselves as a trusted entity of some kind making the recipient feel as if they are conversing with trustworthy person, or a company the victim might do business with. It's one of the oldest types of cyber attacks and it's still one of the most widespread and harmful. In my research I found that the F5 Lab of Artificial Threat Intelligence breaks down phishing into three distinct operations.
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2020-01-15
Issue
Section
License
Copyright (c) 2020 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.