๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Prevention strategies for the next wave of cyber crime

โœ Scribed by Phillip Hallam-Baker


Book ID
104392223
Publisher
Elsevier Science
Year
2005
Tongue
English
Weight
394 KB
Volume
2005
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


This new 'face' of cyber crime is fuelled by the professional hacker with nothing but profit in mind. They are more determined and have far better resources to execute their crimes, and stopping them requires the IT industry to adopt a new approach. But first, security professionals must understand the nature of the threat.

Evolution of Phishingfrom Social Engineering to Software Engineering

So exactly how have phishing attacks evolved?

A 'typical' phishing attack is a confidence trick that uses email spam to spread. It is a "social engineering" attack in that it does not exploit technical flaws, but fools people into revealing information.

Typically, a phishing attack has four principal stages:


๐Ÿ“œ SIMILAR VOLUMES


New strategies for the prevention of str
โœ Ai-Jun Liu; Jin-Min Guo; Weiliang Xia; Ding-Feng Su ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 444 KB