Author : Shashank singh 1
Date of Publication :30th November 2017
Abstract: Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Cyber-crime is emerging as a serious concern. To the world of computer technology which is evolving ever so fast the government, police and intelligence units are taking this issue very seriously. The world of cybersecurity is not a small term it deals with the threats such as Phishing, Eavesdropping, spoofing, tampering, Clickjacking, Hacking. In this paper, we are going to deal with the challenges regarding phishing. Phishing is derived from two words “Password harvesting†which means fishing for passwords. It is an attempt of acquiring sensitive information such as usernames, passwords, and credit card details directly from users. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Preying on a victim's trust, phishing can be classified as a form of social engineering. Phishing is a general term which deals with several subtypes which are discussed further in the paper. Phishing is further classified into Spear phishing, Whale phishing, and Clone phishing. The threats of phishing have confronted us with several challenges concerning with security of data, vulnerability inside an organization, holes insecurities in a computer system.Now a day’s attacks had become major issues in networks. Attacks will intrude into the
Reference :
-
- Engin Kirda and Christopher Kruegel 2005 ,” Protecting Users Against Phishing Attacks with AntiPhish”. Computer Software and Applications Conference, COMPSAC 2005. 29th Annual International (Volume: 1 ).
- Craig M. McRae Rayford B. Vaughn 2007 ,” Phighting the Phisher:Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks “,Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
- Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei Bidgoli 2007, “Learn To Detect Phishing Scams Using Learning and Ensemble Methods”, Proceedings of the 2007 IEEE/WIC/ACM. [4] M. Young, The Technical Writer’s Handbook. Mill Valley,.
- Anti-Phishing Working Group (2009) “Phishing Activity Trends Report: 3rd Quarter 2009” Availablehttp://www.antiphishing.org/reports/apwg_report _Q3_2009.pdf (Accessed: 15 January 2010).
- Dhamija, R., Tygar, J.D. and Hearst, M. (2006) “Why Phishing Works”, Proceedings of the SIGCHI conference on Human Factors in computing systems, Montréal, Québec, Canada. pp. 581-590.
- Gartner (2010) “Gartner Survey Shows Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks”. [8]http://www.gartner.com/it/page.jsp?id=565125 (Accessed: 21 January 2010).
- Herzberg, A. and Jbara, A. (2008) “Security and Identification Indicators for Browsers against Spoofing and Phishng Attacks” ACM Transaction on Internet Technology
- Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menezer, F. (2007) “Social Phishing