Phishing Attacks in Cyber Security

Authors

  • Prof. Pradip Sitaram Ingle  Assistant Professor, Department of Information Technology, Anuradha Engineering College Chikhli, Maharashtra, India
  • Ms. Pranita Shivkumar Murkar  Student, Information Technology Department, Anuradha Engineering College, Chikhli, Maharashtra, India
  • Ms. Shital Prabhu Gadkari  Student, Information Technology Department, Anuradha Engineering College, Chikhli, Maharashtra, India

Keywords:

Abstract

In using various techniques of social engineering, the criminels font des ravages sur Internet et escroquent de nombreuses personnes de different manières. Cela met diverses communautes organizations, en danger. Therefore, it is important that people in those communities learn to protect themselves when active in cyberspace or when confronted with cyberspace-related technologies. In fact, training can play an important role in this regard and, consequently, help alter the unsafe behavior of many people. The goal of this research article is to determine whether simulating phishing attacks in conjunction with built-in training can help cultivate user resistance to "phishing attacks."

References

  1. Ramzan, Zulfikar (2010). "Phishing attacks and countermeasures". In Stamp, Mark; Stavroulakis, Peter (eds.). Handbook of Information and Communication Security. Springer. ISBN 978-3-642-04117-4.
  2. "Internet Crime Report 2020" (PDF). FBI Internet Crime Complaint Centre. U.S. Federal Bureau of Investigation. Retrieved 21 March 2021. "Internet Crime Report 2020" (PDF). FBI Internet Crime Complaint Centre. U.S. Federal Bureau of Investigation. Retrieved 21 March 2021.
  3. Jøsang, Audun; et al. (2007). "Security Usability Principles for Vulnerability Analysis and Risk Assessment". Proceedings of the Annual Computer Security Applications Conference 2007 (ACSAC'07). Archived from the original on 2021-03-21. Retrieved 2020-11-11.
  4. Gaurav, Madhuresh Mishra, Anurag Jain - Anti-Phishing Techniques: A Review, International Journal of Engineering Research and Applications (IJERA), vol. 2, pp. 350- 355, April – 2012.
  5. Masoumeh Zareapoor, K.R. Seeja, Text Mining for Phishing E-mail Detection, Intelligent Computing, Communication and Devices: Advances in Intelli-gent Systems and Computing, vol. 308, pp. 65-71, August 2016.
  6. Rakesh Verma, Narasimha Karpoor, Nabil Hossain and Nirmala Rai - Automatic Phishing Email De-tection based on Natural Language Processing Techniques, Research Gate, 2016.
  7. Anna L. Buczak, Erhan Guven - A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communica-tons Surveys & Tutorials, vol. 18, pp. 1153-1176, June – 2016.
  8. Yi-Shin Chen, Huei-Sin Liu, Yi-Hsuan Yu and Pang-Chieh Wang, Detect Phishing by Checking Content Consistency, IEEE, 2017.
  9. Okunoye, O.B, Azeez, N.A, Ilurimi F.A - A Web Enabled Anti-Phishing Solution Using Enhanced Heuristic Based Technique, FUTA Journal of Re-search in Sciences, vol. 13 (2), pp. 304-321, Octo-ber – 2017.
  10. Xavier Joseph, Mitchell Aime M, Tsang Brian J, Herbert, George A, Savastano, Hernan I, Khandel-wal Lubdha, Pengelly Robert C. J, Novitskey Robert, Grant Stanley - Anti-phishing protection, United States Patent 10,069,865 B2, Sept 4th, 2018 Sankhwar S., Pandey D., Khan R.A - A Novel Anti-phishing Effectiveness Evaluator Model, Smart Innovation, Systems and Technologies, Springer, vol 84, Cham, 2018.
  11. “PM Narendra Modi pushes for use of technology in the 'era of Covid-19'”

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Pradip Sitaram Ingle, Ms. Pranita Shivkumar Murkar, Ms. Shital Prabhu Gadkari, " Phishing Attacks in Cyber Security" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 4, pp.90-97, May-June-2021.