{"title":"BIMI规范作为对抗电子邮件网络钓鱼的另一种技术方法","authors":"I. Dolnák, K. Kampová","doi":"10.1109/ICETA57911.2022.9974949","DOIUrl":null,"url":null,"abstract":"Phishing attacks in various forms are currently considered to be the most common and at the same time the most successful form of computer attack, when the attacker tries to obtain sensitive information or convince employees of organizations to perform certain actions, such as installation of malicious software. Areas with a large amount of processed personal data are particularly attractive to attackers. As part of our research supported by the Slovak Research and Development Agency, grant number APVV-20-0457, we focused on phishing attacks carried out in the field of healthcare and thus supplemented the previous experience in the field of education. The following article presents the characteristics of the most common forms of phishing attacks and an indication of the emerging BIMI specification intended for the effective fight against phishing attacks carried out through the exchange of e-mail messages.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"BIMI specification as another technical approach in the fight against e-mail phishing\",\"authors\":\"I. Dolnák, K. Kampová\",\"doi\":\"10.1109/ICETA57911.2022.9974949\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing attacks in various forms are currently considered to be the most common and at the same time the most successful form of computer attack, when the attacker tries to obtain sensitive information or convince employees of organizations to perform certain actions, such as installation of malicious software. Areas with a large amount of processed personal data are particularly attractive to attackers. As part of our research supported by the Slovak Research and Development Agency, grant number APVV-20-0457, we focused on phishing attacks carried out in the field of healthcare and thus supplemented the previous experience in the field of education. The following article presents the characteristics of the most common forms of phishing attacks and an indication of the emerging BIMI specification intended for the effective fight against phishing attacks carried out through the exchange of e-mail messages.\",\"PeriodicalId\":151344,\"journal\":{\"name\":\"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETA57911.2022.9974949\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA57911.2022.9974949","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
BIMI specification as another technical approach in the fight against e-mail phishing
Phishing attacks in various forms are currently considered to be the most common and at the same time the most successful form of computer attack, when the attacker tries to obtain sensitive information or convince employees of organizations to perform certain actions, such as installation of malicious software. Areas with a large amount of processed personal data are particularly attractive to attackers. As part of our research supported by the Slovak Research and Development Agency, grant number APVV-20-0457, we focused on phishing attacks carried out in the field of healthcare and thus supplemented the previous experience in the field of education. The following article presents the characteristics of the most common forms of phishing attacks and an indication of the emerging BIMI specification intended for the effective fight against phishing attacks carried out through the exchange of e-mail messages.