Prevention strategies for the next wave of cyber crime
โ Scribed by Phillip Hallam-Baker
- Book ID
- 104392223
- Publisher
- Elsevier Science
- Year
- 2005
- Tongue
- English
- Weight
- 394 KB
- Volume
- 2005
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
This new 'face' of cyber crime is fuelled by the professional hacker with nothing but profit in mind. They are more determined and have far better resources to execute their crimes, and stopping them requires the IT industry to adopt a new approach. But first, security professionals must understand the nature of the threat.
Evolution of Phishingfrom Social Engineering to Software Engineering
So exactly how have phishing attacks evolved?
A 'typical' phishing attack is a confidence trick that uses email spam to spread. It is a "social engineering" attack in that it does not exploit technical flaws, but fools people into revealing information.
Typically, a phishing attack has four principal stages:
๐ SIMILAR VOLUMES