Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ANALYSIS OF VULNERABILITY FROM PHISHING EMAIL ANALYSIS OF VULNERABILITY FROM PHISHING EMAIL Name of Student Name of University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ANALYSIS OF VULNERABILITY FROM PHISHING EMAIL I have received a phishing email from some illicit source. The message contains the requirement for my banking details. They were asking my user identification number and the password for some verification. The message claimed to be from the owner of the bank from where my account belongs. The email also provided some direct link to some website. After clicking on to that website link there is a survey type form which asks for my banking details. The website seem to be little fake to me because it do not have any identification of the legitimate website. I was about to give my personal details because the email states that these verification is important for the credit card I have applied (Harrison, Svetieva & Vishwanath, 2016). Then something stops me from doing the required steps that are asked in the email. I thought of searching in the internet to learn about the website after that uploading my documents. I learned that the website was fake and it has nothing to do with the bank. I took the step to report that email address as spam that will help the other users to avoid to become a victim of such malicious email. I also ensured that I report the Gmail abuse to the Google so that the spam email can be detected by the other. I also doubted that my Gmail address is taken by the spammers and so I recover my Gmail account before opening any other emails that contains any important message (Patel, 2018). Hence it is very risky to open such malicious emails it can also destroy the other emails and can hack my personal information.
2ANALYSIS OF VULNERABILITY FROM PHISHING EMAIL References Harrison, B., Svetieva, E., & Vishwanath, A. (2016). Individual processing of phishing emails: How attention and elaboration protect against phishing.Online Information Review,40(2), 265-281. Patel, D. (2018). Test Utility for Live and Online Testing of an Anti-Phishing Message Security System.