2008 IEEE Symposium on Computers and Communications 2008
DOI: 10.1109/iscc.2008.4625681
|View full text |Cite
|
Sign up to set email alerts
|

A phishing vulnerability analysis of web based systems

Abstract: Phishing, a criminal act ofcollecting personal, bank and credit card information by sending outforged e-mails with fake websites, has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more and more sophisticated and are constantly on the rise. The impact ofphishing is quite drastic since it involves the threat of identity theft and financial losses. A lot of groups and organizations are trying to study this act and also inform and update the public on what are the l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(21 citation statements)
references
References 0 publications
0
20
0
1
Order By: Relevance
“…A phisher uses social engineering practices to defraud honest Internet users into providing their financial and personal information (Yu, Nargundkar and Tiruthani 2008). Phishers know that the Internet users seem to be the weakest link in the protection chain.…”
Section: Human Vs Automatic Based Protectionmentioning
confidence: 99%
“…A phisher uses social engineering practices to defraud honest Internet users into providing their financial and personal information (Yu, Nargundkar and Tiruthani 2008). Phishers know that the Internet users seem to be the weakest link in the protection chain.…”
Section: Human Vs Automatic Based Protectionmentioning
confidence: 99%
“…The counterfeit website is then used to gather information such as usernames and passwords as well as sending out spam emails. Banking information, such as credit card details, is usually the primary target and the success Phishers tend to have means this type of attack has become the most popular way of conducting cyber-crime [140]. were victims and were affected financially as a result of successful Phishing attacks [141].…”
Section: Cyber-threat Growing Concernmentioning
confidence: 99%
“…This is called defrauding in the law but in computer science it is called phishing. Phishing is the criminal act of illegal access to secret and sensitive information such as username, password, and credit card details by showing an electronic connection as apparently trustworthy [4].…”
Section: Introductionmentioning
confidence: 99%