logo

A Literature Survey on Social Engineering Attacks: Phishing Attack

   

Added on  2022-10-04

8 Pages2099 Words52 Views
Running head: IT SECURITY
IT SECURITY
Name of the Student
Name of the Organization
Author Note

IT SECURITY1
A Literature Survey on Social Engineering Attacks: Phishing Attack
Introduction
The actual aim of the security of information is mainly to protect the information
which is greatly sensitive from that of all the various attacks of social engineering like the
attack of phishing and laundering of money. The attack of social engineering is basically a
kind of art where people gets manipulated who possess very much less knowledge regarding
all the various kinds of attack. It has been well noticed that each and every organization
possess a number of various issues related to security which brings in a number of various
concerns to all the users, developers of site and several specialists for the purpose of
defending the data which is greatly confidential from certain kinds of attacks of social
engineering. Phishing has been observed to be a hugely serious problem in the unlimited
internet service. There are a number of various ways of tricking various people for the
purpose of disclosing information from that of the user by utilising attacks of social
engineering. This attack of phishing is considered to be one of the most popular among all of
them. Here in this case, all the attackers highly bait various users by sending a number of
mails like winning prizes, sending messages from certain kinds of accounts which are entirely
fake on the sites of social networking and password hacking. Attackers even asks for the
account numbers as well as the numbers of credit cards for capturing various details. It
utilised various techniques of social engineering with several tricks that have been greatly
arranged for baiting users. This article has its main aim towards describing various kinds of
phishing attacks and properly explaining broadly regarding the prevention from various kinds
of attacks of social engineering. The paper will also be comprising of the proper analysis on
the techniques of the detection of social engineering attacks.
Phishing attacks
This particular attack is basically a cybercrime where the attacker will be
manipulating various people for eliciting all the data which are greatly personal. It has been
considered to be a huge issue related to security within the society. There are various
numbers as well as techniques of different kinds of solutions which have been present in the
current days for preventing such kinds of attacks [1]. However, it has also been observed that
various users are offering a lot of various personal information upon the webpage of phishing
which makes it really very much difficult for all the programmers. It has really become very

IT SECURITY2
much difficult to properly distinguish between the email which is a legitimate one and the
one which is spoofed [2]. The email which is spoofed is known to be causing a huge harm to
the authentication of various users.
Types of Phishing Attacks
Spoofing email: This is basically a kind of attack of phishing and this spoofing is whenever
any spammer will be sending an email by utilising some other address of email. It will
actually seem as if the message is only for them and this will be tricking various people into
directly opening it.
Fake accounts of social networks: It has been noticed that all the various users of social
media sites like Facebook, LinkedIn as well as Twitter are totally unconscious regarding all
of their accounts. Any kind of fake account is easily created on the sites of social networking
by any kind of attacker [3]. Utilising such kinds of fake accounts, attackers often obtains the
access of all the secret data which any user provides whenever the account is created.
Hacking: Hacking is basically a kind of effort which is technical for manipulating the
system’s access or rather resources. A hacker is basically a kind of person who is capable of
engaging within that procedure [4]. Hackers mostly utilises any kind of scanner of
vulnerability or rather scanner of port for checking various computers upon the network for
all kinds of weaknesses which are totally known. Within this, social engineering has been
observed to be very much efficient as the users have been observed to be the part which is
mostly vulnerable of any organization [5].
Trojan horse: The attacks of Trojan horse is considered to be the threat which is mostly
deliberate to that of the security of the system [6]. It is basically a program which is
executable. It is a kind of code which has been specially designed for obtaining control over
the entire system.
Prevention of Phishing Social Engineering Attack
Detection of spoofed email: However there are no such way of stopping the spoofing of
email, there is only one possible trick of setting filtering of span for identifying all the emails
which will be spoofed. Actually the best way of stopping phishing is the direct blocking of
various emails which are malicious before they will be reaching the customer with the
DMARC by any organization [7]. It can be recommended that no one must be trusting upon
the name written on the display as various attackers utilise the names of brands. Any attacker

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Social Engineering Attacks: Phishing Attacks
|11
|653
|328

Phishing Attacks: Research and Defense Strategies
|8
|2164
|404

Effectiveness of Social Engineering
|5
|782
|81

Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security
|11
|1381
|117

Phishing Attacks | Research Report
|12
|2749
|45

Phishing Attack: Types, Technical Tricks, and Countermeasures
|10
|2496
|423