Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing
نویسنده
چکیده
Phishing (password + fishing) is a form of cyber crime based on social engineering and site spoofing techniques. The name of ‘phishing’ is a conscious misspelling of the word 'fishing' and involves stealing confidential data from a user’s computer and subsequently using the data to steal the user’s money. In this paper, we study, discuss and propose the phishing attack stages and types, technologies for detection of phishing web pages, and conclude our paper with some important recommendations for preventing phishing for both consumer and company.
منابع مشابه
Cyber-crime Science = Crime Science + Information Security
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the eff...
متن کاملA Study on Cyber Crimes and protection
Information technology has widened itself over the last two decades and has become the axis of today’s global development. The world of internet provides every user all the required information and latest information making it the most valuable source of information. With the advancement of internet, the crime has also widened its roots in all possible directions which claim to be the biggest t...
متن کاملAn Efficient Approach Based on Neuro-Fuzzy for Phishing Detection
In the Internet era, the online trading of various fields is growing quickly. As a result, cyber crime is increasing constantly. Phishing is a new type of crime aimed at stealing user information via these fake web pages. Most of these phishing web pages look similar to the real web pages in terms of website interface and uniform resource locator (URL) address. Many techniques have been propose...
متن کاملPredicting the performance of users as human sensors of security threats in social media
While the human as a sensor concept has been utilised extensively for the detection of threats to safety and security in physical space, especially in emergency response and crime reporting, the concept is largely unexplored in the area of cyber security. Here, we evaluate the potential of utilising users as human sensors for the detection of cyber threats, specifically on social media. For thi...
متن کاملSocial Phishing
Email spam: unsolicited emails for the purpose of advertisement or committing fraud. Phishing: electronic fraud based on social engineering. Phisher: fraudsters who commit phishing crimes. Phishing site: web sites created by phishers to steal sensitive information from users. Anti-phishing: efforts taken from multiple perspectives to combat phishing crimes. Machine learning: the design and deve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1201.0949 شماره
صفحات -
تاریخ انتشار 2012