Phishing (initial idea 1)
Phishing is a branch of cyber threats. However, what do we mean by phishing?
Phishing is known as a criminal offence in which a person pretends that he is a legitimate institution, in order to deceive the target people and steal secret information, such as personal data and banking details. Moreover, the criminal contacts the victims by email, telephone or text message (PHISHING,2019).
What are the reasons for Phishing?
There is one obvious straightforward reason for phishing: money. Identity theft is simple and almost hazard-free. Gartner reports that just 1 of every 700 identity thieves are arraigned. Thus, phishing simplifies theft and reduces the percentage of negative consequences ( Lininger, R and Vines, R,2005).
What happens in a phishing attack?
What are the used methods for a phishing attack?
Frequently, phishing is used by two approaches Malicious attachments and Access to malicious websites by links.
1- Malicious attachments
In this method, the criminals use links that indicate a legitimate clone of websites, which download malware (Itgovernance,2021).
How to identify a phishing attack?
Here are some points assist you to recognise Phishing attack:
* If the email sent by someone you do not talk with usually, be careful! Particularly if the email contains something irrelevant to your responsibilities (alwarebytes,2020).
*The message attached with malware or ransomware overwhelmingly will be included as an unexpected message (alwarebytes,2020).
*Check hyperlinks because of a fake URL containing misspellings. Consequently, reveals a phishing attempt (alwarebytes,2020).
For instance;
As it is shown, a phishing attempt asked the victim to click on 'Confirm Now'. Nevertheless, concentrating on the URL in the red rectangle, you will see the random numbers that make the message questionable.
Reference:
ANTIBEX (2018) How Cyber-Secure Is Your Business?. [Online image] Available from: How Cyber-Secure Is Your Business? - Antibex Software[Accessed 24/04/2021].
PHISHING(2017) What Is Phishing?. [Online] PHISHING. Available from: Phishing | What Is Phishing? [Accessed 24/04/2021].
ITGOVERNANCE(2019) Phishing attacks and how to avoid them. [Online] ITGOVERNANCE. Available from: What is phishing? Everything you need to know | IT Governance UK [Accessed 24/04/2021].
ALWAREBYTES(2019) What is phishing?. [Online] ALWAREBYTES. Available from: What is phishing? How to protect from types of phishing? | Malwarebytes [Accessed 24/04/2021].
LININGER, R and VINES, R(2005) Phishing Cutting The Identity Theft Line. [Online] Available from: ProQuest Ebook Central - Detail page[Accessed 24/04/2021].







1 Comments
Good post structure.
ReplyDeleteIt would be better if you add more details to the post and remember to follow the Harvard referencing style.