{"title":"反网络钓鱼框架综述","authors":"Preeti Chaudhary","doi":"10.17762/itii.v7i3.812","DOIUrl":null,"url":null,"abstract":"Phishing is an assault that is typically carried out by combining foundations of social engineering with ever-evolving technical approaches. Phishing is also known as spear phishing. This masking of the phony site to work as if it were the real one induces the user to divulge their personal details such as the passwords and bank accounts associated with such accounts. As a result, in modern times, conducting an exhaustive study on previous attacks is obligatory in order to adequately prepare ourselves to avoid becoming victims of such dangers. The purpose of this study article is to provide a better knowledge on the working principles of such threats, to promote the development of anti-phishing measures in the future, and to provide a brief discussion on prior and ongoing attacks. The fundamental purpose of the work that is being given is to raise people's levels of awareness and teach them on how to protect themselves from attacks of this kind. In addition, the purpose of this assessment is to offer assistance to policy makers and software developers so that they may arrive at the best decisions and help create an environment free of viruses.","PeriodicalId":40759,"journal":{"name":"Information Technology in Industry","volume":"60 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review on Anti-Phishing Framework\",\"authors\":\"Preeti Chaudhary\",\"doi\":\"10.17762/itii.v7i3.812\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing is an assault that is typically carried out by combining foundations of social engineering with ever-evolving technical approaches. Phishing is also known as spear phishing. This masking of the phony site to work as if it were the real one induces the user to divulge their personal details such as the passwords and bank accounts associated with such accounts. As a result, in modern times, conducting an exhaustive study on previous attacks is obligatory in order to adequately prepare ourselves to avoid becoming victims of such dangers. The purpose of this study article is to provide a better knowledge on the working principles of such threats, to promote the development of anti-phishing measures in the future, and to provide a brief discussion on prior and ongoing attacks. The fundamental purpose of the work that is being given is to raise people's levels of awareness and teach them on how to protect themselves from attacks of this kind. In addition, the purpose of this assessment is to offer assistance to policy makers and software developers so that they may arrive at the best decisions and help create an environment free of viruses.\",\"PeriodicalId\":40759,\"journal\":{\"name\":\"Information Technology in Industry\",\"volume\":\"60 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Technology in Industry\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17762/itii.v7i3.812\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Technology in Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17762/itii.v7i3.812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Phishing is an assault that is typically carried out by combining foundations of social engineering with ever-evolving technical approaches. Phishing is also known as spear phishing. This masking of the phony site to work as if it were the real one induces the user to divulge their personal details such as the passwords and bank accounts associated with such accounts. As a result, in modern times, conducting an exhaustive study on previous attacks is obligatory in order to adequately prepare ourselves to avoid becoming victims of such dangers. The purpose of this study article is to provide a better knowledge on the working principles of such threats, to promote the development of anti-phishing measures in the future, and to provide a brief discussion on prior and ongoing attacks. The fundamental purpose of the work that is being given is to raise people's levels of awareness and teach them on how to protect themselves from attacks of this kind. In addition, the purpose of this assessment is to offer assistance to policy makers and software developers so that they may arrive at the best decisions and help create an environment free of viruses.