2022
DOI: 10.1177/10567879221082966
|View full text |Cite
|
Sign up to set email alerts
|

Phishing—A Cyber Fraud: The Types, Implications and Governance

Abstract: Internet users are becoming ignorant with their data and the transparency of information due to the nature of high-speed internet today. Regrettably, internet users are deceived by engineering tactics performed by highly trained people, namely cybercriminals. Thus, in order to combat phishing attacks, internet users should be educated on security concerns, the influence of social engineering and anti-phishing knowledge. This paper presents a literature review of phishing, a type of cyber fraud, covering the ty… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…• Phishing: Phishing is an attack method where the perpetrator masquerades as a legitimate source, such as an email sender, in order to get access to sensitive information. 54 Almost all of the processes for Internet of Things devices will be automated, and they will operate using a request-response model. Intelligent context-aware computing to distinguish between malicious and legitimate requests will be extremely challenging to implement.…”
Section: Attacks On Application Layermentioning
confidence: 99%
See 1 more Smart Citation
“…• Phishing: Phishing is an attack method where the perpetrator masquerades as a legitimate source, such as an email sender, in order to get access to sensitive information. 54 Almost all of the processes for Internet of Things devices will be automated, and they will operate using a request-response model. Intelligent context-aware computing to distinguish between malicious and legitimate requests will be extremely challenging to implement.…”
Section: Attacks On Application Layermentioning
confidence: 99%
“…These sniffing attacks can be used against protocols that send either passwords or data in plain text or both passwords and data in clear text. Telnet, HTTP, SMTP, NNTP, POP, FTP, and IMAP, for instance, are some of the protocols that are susceptible to the sniffer. Phishing : Phishing is an attack method where the perpetrator masquerades as a legitimate source, such as an email sender, in order to get access to sensitive information 54 . Almost all of the processes for Internet of Things devices will be automated, and they will operate using a request‐response model.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…These emails often pretend to be from real organizations, like banks or social media platforms, and use "social engineering" techniques to trick users into doing what the hackers want [4]. Phishing attacks can lead to identity theft, loss of money, and systems that aren't secure [5]. Also, spear-phishing attacks are a more advanced type of phishing that targets specific people or organizations and often uses personal information to make the attack seem more real [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…They can also use social media to exploit victims' emotions, such as their fears and desires. 1 Nigeria, a country with a population of over 200 million had over 31.6 million active social media users. With most popular social media platforms with WhatsApp having over (95%) users, Facebook having over (88.8%), Facebook Messenger having over (69.9%), Instagram having over (69.4%) and Twitter having over (61.2%).…”
Section: Introductionmentioning
confidence: 99%