Kamil Halouzka, Pavel Kozak, Ladislav Burita, Petr Matoulek
{"title":"Personal cyber security in email communication","authors":"Kamil Halouzka, Pavel Kozak, Ladislav Burita, Petr Matoulek","doi":"10.1109/ICMT52455.2021.9502740","DOIUrl":null,"url":null,"abstract":"The article presents a description and analysis of phishing e-mails that were sent to one of the authors within two months. The article deals with social engineering, of which phishing attacks are a part, and describes the philosophy and tactics of attackers. Attention is focused on a detailed analysis of received e-mails and their decomposition from the point of view of the companies behind which attackers hide, analysis of offers and promises, frequency of receiving phishing e-mails and also on whether attackers hide behind men or women and where emails are most often sent.","PeriodicalId":276923,"journal":{"name":"2021 International Conference on Military Technologies (ICMT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Military Technologies (ICMT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMT52455.2021.9502740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The article presents a description and analysis of phishing e-mails that were sent to one of the authors within two months. The article deals with social engineering, of which phishing attacks are a part, and describes the philosophy and tactics of attackers. Attention is focused on a detailed analysis of received e-mails and their decomposition from the point of view of the companies behind which attackers hide, analysis of offers and promises, frequency of receiving phishing e-mails and also on whether attackers hide behind men or women and where emails are most often sent.