logo

Social Phishing Assignment 2022

   

Added on  2022-10-11

10 Pages2080 Words15 ViewsType: 15
 | 
 | 
 | 
Running head: SOCIAL PHISHING
SOCIAL PHISHING
Name of the student:
Name of the university:
Author Note:
Social   Phishing   Assignment   2022_1

SOCIAL PHISHING1
Table of Contents
1.0 Introduction..........................................................................................................................2
2.0 Analysis of the Article.........................................................................................................2
2.1 Intention and Content of the Article.................................................................................3
2.2 Problems associated with the attack.................................................................................5
2.3 Discussion of the result....................................................................................................6
2.4 Discussion of the conclusion............................................................................................6
3.0 Conclusion............................................................................................................................6
4.0 References............................................................................................................................8
Social   Phishing   Assignment   2022_2

SOCIAL PHISHING2
1.0 Introduction
Social phishing is depicted as a form of engineering module that deals with the overall
attempts made by potential attackers that tends to acquire the sensitive information in respect
to the overall data present within the networks. In modern times the attacks regarding the
phishing is employed by the generalized lures. The most common format of phishing is
described as the social media phishing that deals with the overall networking sites thus to
obtain the information of the user thus affecting them. The article that will be analysed in this
report will be dealing with the overall information about the social phishing that are
perceived in these modern times. The reliable data that is stored as well as accessed in respect
to the overall social media sites are depicted to be involved in respect to the concept of social
phishing. The research that is being analysed in respect to the data protection as well as
security within the social media sites. Most importantly, the article analyses different aspects
of the social phishing attacks that hamper the overall user data in respect to the social media
sites.
The report will deal with the critical analysis of the depicted article thus analysing the
perceptions of the social media phishing. The aspects of the phishing methods in respect to
the attackers associated with these methodologies are analysed within this report as it is
mentioned within the article.
2.0 Analysis of the Article
This report will be significantly carrying out the analysis of the potential article that is
depicted as “T. Jagatic, N. Johnson, M. Jakobsson and F. Menczer, Social Phishing. Indiana
University, Bloomington: School of Informatics, 2005.” The next part of the report will deal
with the intention as well as the content of the article that is to be analysed.
Social   Phishing   Assignment   2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Security Techniques: AES, DES and RSA Algorithms
|11
|2207
|437

Application Security: Building in Security During the Development Stage
|9
|2231
|166

Application Security Market: A Survey
|9
|2188
|117

Sensing, Smart and Sustainable Enterprise Systems
|10
|2218
|234

Test Automation and Test Driven Development
|9
|2166
|92

Implementation of Iot Based Smart Agriculture System
|14
|3345
|23