A Review on Anti-Phishing Framework

Preeti Chaudhary
{"title":"A Review on Anti-Phishing Framework","authors":"Preeti Chaudhary","doi":"10.17762/itii.v7i3.812","DOIUrl":null,"url":null,"abstract":"Phishing is an assault that is typically carried out by combining foundations of social engineering with ever-evolving technical approaches. Phishing is also known as spear phishing. This masking of the phony site to work as if it were the real one induces the user to divulge their personal details such as the passwords and bank accounts associated with such accounts. As a result, in modern times, conducting an exhaustive study on previous attacks is obligatory in order to adequately prepare ourselves to avoid becoming victims of such dangers. The purpose of this study article is to provide a better knowledge on the working principles of such threats, to promote the development of anti-phishing measures in the future, and to provide a brief discussion on prior and ongoing attacks. The fundamental purpose of the work that is being given is to raise people's levels of awareness and teach them on how to protect themselves from attacks of this kind. In addition, the purpose of this assessment is to offer assistance to policy makers and software developers so that they may arrive at the best decisions and help create an environment free of viruses.","PeriodicalId":40759,"journal":{"name":"Information Technology in Industry","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Technology in Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17762/itii.v7i3.812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Phishing is an assault that is typically carried out by combining foundations of social engineering with ever-evolving technical approaches. Phishing is also known as spear phishing. This masking of the phony site to work as if it were the real one induces the user to divulge their personal details such as the passwords and bank accounts associated with such accounts. As a result, in modern times, conducting an exhaustive study on previous attacks is obligatory in order to adequately prepare ourselves to avoid becoming victims of such dangers. The purpose of this study article is to provide a better knowledge on the working principles of such threats, to promote the development of anti-phishing measures in the future, and to provide a brief discussion on prior and ongoing attacks. The fundamental purpose of the work that is being given is to raise people's levels of awareness and teach them on how to protect themselves from attacks of this kind. In addition, the purpose of this assessment is to offer assistance to policy makers and software developers so that they may arrive at the best decisions and help create an environment free of viruses.
反网络钓鱼框架综述
网络钓鱼是一种攻击,通常通过将社会工程的基础与不断发展的技术方法相结合来实现。网络钓鱼也被称为鱼叉式网络钓鱼。这种伪装使虚假网站像真实网站一样工作,诱使用户泄露他们的个人详细信息,如密码和与这些账户相关的银行账户。因此,在现代,对以前的袭击进行详尽的研究是必要的,以便我们自己做好充分的准备,避免成为这种危险的受害者。本研究文章的目的是为了更好地了解此类威胁的工作原理,促进未来反网络钓鱼措施的发展,并对先前和正在进行的攻击进行简要讨论。正在进行的工作的根本目的是提高人们的认识水平,并教他们如何保护自己免受这类攻击。此外,本评估的目的是为政策制定者和软件开发人员提供帮助,以便他们可以做出最佳决策,并帮助创建一个没有病毒的环境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Information Technology in Industry
Information Technology in Industry COMPUTER SCIENCE, SOFTWARE ENGINEERING-
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信