logo

Hybrid Feature Selection for Phishing Email Detection

   

Added on  2023-06-15

6 Pages914 Words387 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author’s note

1CYBER SECURITY
Table of Contents
Answer to question 1......................................................................................................2
Answer to question 2......................................................................................................3
Answer to question 3......................................................................................................3
Answer to question 4......................................................................................................3
Answer to question 5......................................................................................................3
Answer to question 6......................................................................................................4
Answer to question 7......................................................................................................4
References......................................................................................................................6

2CYBER SECURITY
Answer to question 1
The main contribution of this paper is to provide solutions so that the consumers and the
business can protect their system and database from the phishing attack. The paper describes
hybrid approaches by which the phishing emails can be identified. The hybrid approach is
basically a mixture of behaviour-based approaches and the content-based approaches (Zhou,
Shi and Zhang 2007). Domain server generally handles all the domain emails and it is also
capable to detect all the abnormal email as well. By analyzing the message ID tag, the
attackers’ mail can be identified by domain server. Along with that, a hybrid approach can be
useful to know the attackers’ behaviour. The proposed hybrid structure proposed in the paper
is effective in detecting the phishing email.
Answer to question 2
The author of this article addresses how attackers conduct the malicious activities
over the online website (Zhang, Du and Liu 2007). The author also focuses on how a
company can safeguard their sensitive data from the phishing attack.
Answer to question 3
The attackers send spoofed emails to the users. The users click those links and are
directed to the malicious website. The malicious websites look like the real website. The
users enter all the credentials and the personal details on that website and those data get
compromised due to hackers’ attack (Hamid and Abawajy 2011). The hackers collect the
account numbers, the passwords, and bank card details from the users. In this way, the users
become victims.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Principle Discussion 2022
|5
|1209
|25

Cyber Defence For Business Analysis Report
|11
|1814
|11

Cyber Defense in Web-Based Attacks | Study
|6
|1596
|13

Trends in Cybercrime
|10
|2680
|446

Network Security Fundamentals
|4
|659
|33

Assignment on Cyber Defense in Web Based Attacks
|7
|1418
|22