Phishing Attacks in Cyber Security
Keywords:
Abstract
In using various techniques of social engineering, the criminels font des ravages sur Internet et escroquent de nombreuses personnes de different manières. Cela met diverses communautes organizations, en danger. Therefore, it is important that people in those communities learn to protect themselves when active in cyberspace or when confronted with cyberspace-related technologies. In fact, training can play an important role in this regard and, consequently, help alter the unsafe behavior of many people. The goal of this research article is to determine whether simulating phishing attacks in conjunction with built-in training can help cultivate user resistance to "phishing attacks."
References
- Ramzan, Zulfikar (2010). "Phishing attacks and countermeasures". In Stamp, Mark; Stavroulakis, Peter (eds.). Handbook of Information and Communication Security. Springer. ISBN 978-3-642-04117-4.
- "Internet Crime Report 2020" (PDF). FBI Internet Crime Complaint Centre. U.S. Federal Bureau of Investigation. Retrieved 21 March 2021. "Internet Crime Report 2020" (PDF). FBI Internet Crime Complaint Centre. U.S. Federal Bureau of Investigation. Retrieved 21 March 2021.
- Jøsang, Audun; et al. (2007). "Security Usability Principles for Vulnerability Analysis and Risk Assessment". Proceedings of the Annual Computer Security Applications Conference 2007 (ACSAC'07). Archived from the original on 2021-03-21. Retrieved 2020-11-11.
- Gaurav, Madhuresh Mishra, Anurag Jain - Anti-Phishing Techniques: A Review, International Journal of Engineering Research and Applications (IJERA), vol. 2, pp. 350- 355, April – 2012.
- Masoumeh Zareapoor, K.R. Seeja, Text Mining for Phishing E-mail Detection, Intelligent Computing, Communication and Devices: Advances in Intelli-gent Systems and Computing, vol. 308, pp. 65-71, August 2016.
- Rakesh Verma, Narasimha Karpoor, Nabil Hossain and Nirmala Rai - Automatic Phishing Email De-tection based on Natural Language Processing Techniques, Research Gate, 2016.
- Anna L. Buczak, Erhan Guven - A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communica-tons Surveys & Tutorials, vol. 18, pp. 1153-1176, June – 2016.
- Yi-Shin Chen, Huei-Sin Liu, Yi-Hsuan Yu and Pang-Chieh Wang, Detect Phishing by Checking Content Consistency, IEEE, 2017.
- Okunoye, O.B, Azeez, N.A, Ilurimi F.A - A Web Enabled Anti-Phishing Solution Using Enhanced Heuristic Based Technique, FUTA Journal of Re-search in Sciences, vol. 13 (2), pp. 304-321, Octo-ber – 2017.
- Xavier Joseph, Mitchell Aime M, Tsang Brian J, Herbert, George A, Savastano, Hernan I, Khandel-wal Lubdha, Pengelly Robert C. J, Novitskey Robert, Grant Stanley - Anti-phishing protection, United States Patent 10,069,865 B2, Sept 4th, 2018 Sankhwar S., Pandey D., Khan R.A - A Novel Anti-phishing Effectiveness Evaluator Model, Smart Innovation, Systems and Technologies, Springer, vol 84, Cham, 2018.
- “PM Narendra Modi pushes for use of technology in the 'era of Covid-19'”
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.