logo

Phishing Emails

11 Pages2471 Words256 Views
   

Added on  2023-04-21

About This Document

This report provides an overview of phishing emails, including their background, various techniques used by attackers, and detection methods. It also offers recommendations for countering phishing attacks. The report emphasizes the importance of cyber security and data protection in the digital age.

Phishing Emails

   Added on 2023-04-21

ShareRelated Documents
Running head: PHISHING EMAILS
Phishing Emails
Name of the Student
Name of the University
Author Note
Phishing Emails_1
1PHISHING EMAILS
Executive Summary
Phishing attacks of been one of the most malicious attacks in cyber revolt that often target
unsuspecting individual organisations through sending emails asking them to click on a link
and enter their confidential credentials. The users open fall prey to these attacks as the
attackers know exactly the way due to which a person would click on a link and share their
credentials. There are various ways by which the the people can be exploited about their
vulnerability in sharing online information without any protection. The email sent to them
can be a phishing attack but the user might not have any clue about it. This is why the
following report would identify what specific kinds of phishing attack techniques the
malicious attackers uses including their detection techniques so that any person going through
this report would understand how to avoid phishing email attacks.
Phishing Emails_2
2PHISHING EMAILS
Table of Contents
Introduction................................................................................................................................3
Cyber world and Data Security..............................................................................................3
Background behind Phishing Attacks....................................................................................4
Various phishing techniques used by the attackers................................................................5
Detection techniques of Phishing...........................................................................................6
Recommendation........................................................................................................................7
Conclusion..................................................................................................................................8
References..................................................................................................................................9
Phishing Emails_3
3PHISHING EMAILS
Introduction
Phishing is a specific type of attack that is often used in the cyber world via social
engineering processes for extracting or stealing data and information from users which may
include the login credentials of a person or even their credit card numbers (Gupta et al. 2017).
These kinds of attacks just not extract out the data and information of an individual user but
also has a possibility of extracting out all confidential information about the user that are
available online including their transactions and financial data. From the networking
perspective, the following report would hold what cyber world in data security means, the
background behind the phishing attacks, the various phishing techniques that the attackers
use, and the detection techniques of phishing attacks.
Cyber world and Data Security
The cyber world it is making life easier for people all over the world. It is advancing
with every passing day involving latest technologies and making every work easier than the
other. Although there are several benefits of utilising cyber world into the day to day life,
there are also several disadvantages since the cyber world is evaded with security issues all
over. Anything shared through the cyber world is regarded as data which provide certain
information about an individual. Since, the world of internet has made people share more
about their personal and social life publicly, the cyber world is also implemented people to
carry out the daily activities through you internet as well (Konradt, Schilling and Werners
2016).
This just not includes sharing information about social media, but there are also
techniques by which people conduct the transactional activities everyday and make several
Phishing Emails_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Cybersecurity Threat Name of the Student
|11
|2321
|49

Phishing Attacks: Research and Defense Strategies
|8
|2164
|404

Hybrid Feature Selection for Phishing Email Detection
|6
|914
|387

Phishing Attack: Types, Technical Tricks, and Countermeasures
|10
|2496
|423

Cybersecurity Issues at JK Company
|11
|3067
|80