Abstract

People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities. In recent years, phishing assaults have become one of the most common threats faced by internet users, governments, and service providers. The attacker(s) uses falsified emails or bogus websites to obtain the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) in a phishing assault. Studies have classed phishing attacks based on fundamental phishing mechanisms and defenses, ignoring the importance of the phishing lifecycle from beginning to conclusion. This study also provides a new thorough taxonomy of phishing assaults, including attack phases, attacker types, vulnerabilities, threats, targets, attack media, and attacking strategies. Furthermore, the proposed anatomy will help readers comprehend the full lifecycle of a phishing attack, which will raise awareness of these phishing attacks and the strategies utilized; it will also aid in the development of a comprehensive anti-phishing system. In addition, various preventative precautions are being investigated

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.