logo

Phishing Attacks: Research and Defense Strategies

Research and write a report on phishing attacks on both customers and companies in the field of cyber security.

8 Pages2164 Words404 Views
   

Added on  2023-06-10

About This Document

This report highlights phishing attacks on companies and individuals. It researches how cyber criminals utilise social media to launch phishing attacks. It covers techniques used by cyber criminals when using phishing to gather log in details. This report also covers how individuals and companies protect themselves from phishing attacks and what measures do they need.

Phishing Attacks: Research and Defense Strategies

Research and write a report on phishing attacks on both customers and companies in the field of cyber security.

   Added on 2023-06-10

ShareRelated Documents
SECTION 1 Research into
Phishing Attacks
SECTION 2 Defence
against Phishing Attacks
Phishing Attacks: Research and Defense Strategies_1
Contents
INTRODUCTION...........................................................................................................................1
SECTION 1: Research into Phishing Attacks ................................................................................1
What is phishing and spear phishing...........................................................................................1
How is spear phishing used to target victims...............................................................................1
How do cyber criminals use social media to launch phishing attacks.........................................1
What techniques are used by cyber criminals when using phishing to gather log-in details or
other information.........................................................................................................................2
What effects do phishing attacks have on individual and companies..........................................2
SECTION 2: Defence against phishing attacks...............................................................................3
How do individuals protect themselves from phishing attacks, what methods they can use to
protect themselves........................................................................................................................3
How do companies defend themselves against phishing attacks, what measures do they use....3
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
Phishing Attacks: Research and Defense Strategies_2
Phishing Attacks: Research and Defense Strategies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber-Security and Phishing Attacks: Research and Defence Strategies
|10
|2206
|112

Cyber Security and Phishing Attacks on Customers and Companies
|8
|1902
|456

Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security
|11
|1381
|117

Cyber Attacks: Types, Recent Incidents, Motivations, and Ransomware
|5
|1791
|347

Social Engineering
|6
|1031
|21

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491