反网络钓鱼框架综述

Preeti Chaudhary
{"title":"反网络钓鱼框架综述","authors":"Preeti Chaudhary","doi":"10.17762/itii.v7i3.812","DOIUrl":null,"url":null,"abstract":"Phishing is an assault that is typically carried out by combining foundations of social engineering with ever-evolving technical approaches. Phishing is also known as spear phishing. This masking of the phony site to work as if it were the real one induces the user to divulge their personal details such as the passwords and bank accounts associated with such accounts. As a result, in modern times, conducting an exhaustive study on previous attacks is obligatory in order to adequately prepare ourselves to avoid becoming victims of such dangers. The purpose of this study article is to provide a better knowledge on the working principles of such threats, to promote the development of anti-phishing measures in the future, and to provide a brief discussion on prior and ongoing attacks. The fundamental purpose of the work that is being given is to raise people's levels of awareness and teach them on how to protect themselves from attacks of this kind. In addition, the purpose of this assessment is to offer assistance to policy makers and software developers so that they may arrive at the best decisions and help create an environment free of viruses.","PeriodicalId":40759,"journal":{"name":"Information Technology in Industry","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review on Anti-Phishing Framework\",\"authors\":\"Preeti Chaudhary\",\"doi\":\"10.17762/itii.v7i3.812\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing is an assault that is typically carried out by combining foundations of social engineering with ever-evolving technical approaches. Phishing is also known as spear phishing. This masking of the phony site to work as if it were the real one induces the user to divulge their personal details such as the passwords and bank accounts associated with such accounts. As a result, in modern times, conducting an exhaustive study on previous attacks is obligatory in order to adequately prepare ourselves to avoid becoming victims of such dangers. The purpose of this study article is to provide a better knowledge on the working principles of such threats, to promote the development of anti-phishing measures in the future, and to provide a brief discussion on prior and ongoing attacks. The fundamental purpose of the work that is being given is to raise people's levels of awareness and teach them on how to protect themselves from attacks of this kind. In addition, the purpose of this assessment is to offer assistance to policy makers and software developers so that they may arrive at the best decisions and help create an environment free of viruses.\",\"PeriodicalId\":40759,\"journal\":{\"name\":\"Information Technology in Industry\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Technology in Industry\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17762/itii.v7i3.812\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Technology in Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17762/itii.v7i3.812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络钓鱼是一种攻击,通常通过将社会工程的基础与不断发展的技术方法相结合来实现。网络钓鱼也被称为鱼叉式网络钓鱼。这种伪装使虚假网站像真实网站一样工作,诱使用户泄露他们的个人详细信息,如密码和与这些账户相关的银行账户。因此,在现代,对以前的袭击进行详尽的研究是必要的,以便我们自己做好充分的准备,避免成为这种危险的受害者。本研究文章的目的是为了更好地了解此类威胁的工作原理,促进未来反网络钓鱼措施的发展,并对先前和正在进行的攻击进行简要讨论。正在进行的工作的根本目的是提高人们的认识水平,并教他们如何保护自己免受这类攻击。此外,本评估的目的是为政策制定者和软件开发人员提供帮助,以便他们可以做出最佳决策,并帮助创建一个没有病毒的环境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Review on Anti-Phishing Framework
Phishing is an assault that is typically carried out by combining foundations of social engineering with ever-evolving technical approaches. Phishing is also known as spear phishing. This masking of the phony site to work as if it were the real one induces the user to divulge their personal details such as the passwords and bank accounts associated with such accounts. As a result, in modern times, conducting an exhaustive study on previous attacks is obligatory in order to adequately prepare ourselves to avoid becoming victims of such dangers. The purpose of this study article is to provide a better knowledge on the working principles of such threats, to promote the development of anti-phishing measures in the future, and to provide a brief discussion on prior and ongoing attacks. The fundamental purpose of the work that is being given is to raise people's levels of awareness and teach them on how to protect themselves from attacks of this kind. In addition, the purpose of this assessment is to offer assistance to policy makers and software developers so that they may arrive at the best decisions and help create an environment free of viruses.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Information Technology in Industry
Information Technology in Industry COMPUTER SCIENCE, SOFTWARE ENGINEERING-
自引率
0.00%
发文量
0
期刊最新文献
The Impact of Technology on English Literature and the Publishing Industry: An Evaluative Study Use of Computer Designing for Architectural Infrastructures in Different Terrain Preparing Herbal Formulations through Indigenous and Modern Methods: An Experimental Study A COMPREHENSIVE REVIEW OF ENERGY-BASED ROUTING STRATEGIES FOR INTERNET OF THINGS Area and Power Efficient Fused Floating-point Dot Product Unit based on Radix-2r Multiplier & Pipeline Feedforward-Cutset-Free Carry-Lookahead Adder
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1