ABSTRACT
Phishing is a cybercrime where criminals employ various deceptive techniques to obtain personal information from individuals. There are multiple facets of phishing attacks. These include what Phishing is, known phishing types, and methods used to p…
See full abstracts, authors, references, citations & other publication information.
+
…rotect users’ personal information. While many tools are being used to protect users from phishing attacks, phishing attacks are increasing, its methods and tactics are changing, and more victims are falling for them. The first line of defense in protecting people from phishing attacks is, understanding the dynamics of Phishing and the psychology of both the attacker and the victim, and analyzing users’ decisionmaking strategies in reaction to phishing attacks. This paper is intended to examine the multiple facets of phishing attacks to enhance our understanding of an extremely challenging issue for the IT community as the first step to curb the effects of this persistent crime.By understanding and implementing robust phishing defenses, individuals and organizations can mitigate the risks posed by this prevalent cyber threat, fostering a safer and more secure online environment for everyone.
Full Text/Reference Website: https://www.cscjournals.org/library/manuscriptinfo.php?mc=IJCSS-1702

AUTHORS
Dr. Bouchaib Falah – School of Science and Engineering, Al Akhawayn University, Irfan – Morocco
Associate Professor Sameer Abufardeh – Computer, Electrical, and Software Engineering Dept, Embry–Riddle Aeronautical University, Prescott, AZ, 86301 – United States of America
KEYWORDS
Phishing Email, Social Engineering, Phishing Types, Phishing Countermeasures, Phishing Prevention.
Indexing Keywords: The State of Phishing Attacks and Countermeasures, Phishing Attacks and Countermeasures, Phishing Attacks, Phishing Attacks Countermeasures, The State of Phishing Attacks.
Pages: 54-71
Revised: 30-08-2023
Published: 01-10-2023Published in International Journal of Computer Science and Security (IJCSS).
Volume: 17
Issue: 4
Publication Date: 01-10-2023
*Randomly selected references used in the publication “The State of Phishing Attacks and Countermeasures”.
- APWG (2022). APWG Phishing Activity Trends Reports (2022) anti-phishing work Group, IncAvailable at: https://apwg.org/trendsreports/ (Accessed Aug.. 20, 2023).
- Baral, G., & Arachchilage, N. A. G. (2019). Building confidence not to be phished through a gamified approach: conceptualizing user’s self-efficacy in phishing threat avoidance behavior. In 2019 cybersecurity and cyber forensics conference (CCC), (pp. 102-110).
- Binks, A. (2019). The art of Phishing: past, present and future. Computer Fraud & Security, 2019(4), 9-11.
- Butler, R. (2007). A framework of anti-phishing measures aimed at protecting the online consumer’s identity. The Electronic Library, Volume 25, Number 5, 2007, pp. 517-533(17). Emerald Group Publishing Limited. DOI: https://doi.org/10.1108/02640470710829514
- Barracuda Enterprise Email Security Q2 (2019). Staying Safe from Phishing Attacks. https://blog.lastpass.com/2016/01/staying-safe-from-phishing-attacks.html/
- Code42: The Annual Data Exposure Report: 2023 (2023). https://www.code42.com/resources/reports/2023-data-exposure? (Accessed, May 2023).
- Chorghe, S.P., Shekokar, N. (2016). A survey on anti-phishing techniques in mobile phones. In: 2016 International Conference on Inventive Computation Technologies (ICICT), pp. 1-5.
- Chou, N., Ledesma, R., Teraguchi, Y., & Mitchell, J.C. (2004). Client-Side Defense Against Web-Based Identity Theft. Network and Distributed System Security Symposium.
- Cisco Umbrella. (2021). “Cybersecurity threat trends: phishing, crypto top the list,” https://umbrella.cisco.com/info/2021-cyber-security-threat-trends-phishing-crypto-top-the-list.
- Cloudmark Security Platform for Email, (2023). https://www.cloudmark.com/en/products/email-messaging-security/cloudmark-platform-for-email
CITATIONS
Citations used in the publication “The State of Phishing Attacks and Countermeasures”.
Currently there are no citations collected for this publication at scholarlyabstracts.com.
-
CONTACT US
Please feel free to us at scholarlyabstracts@gmail.com if you wish to:
- Get your journal, conference or thesis, registered with us.
- Update this publication content.