Abstract

The development and widespread introduction of the Internet into everyday life has transformed both economic and social relations. The representation of these relations in digital form has created a digital economy, characterized by an active exchange of information, quick access to information resources, and the transfer of payments to the digital dimension. Social relations in the digital world are represented by social networks, instant messengers, which also provide economic services. At the same time, the new space, the transformed economy and social relations give rise to new threats. Users themselves actively expose information about themselves and their loved ones, photos of vacations and locations to the public. In addition to social networking, viewing entertainment content and online games, bank settlement transactions are popular. The popularization of Internet banking leads to an increased interest in stealing data from intruders. The result of this is an increase in the number of scammers who aim to obtain confidential user information. In addition, since the beginning of the war, the number of cyber attacks on public authorities, critical information infrastructure facilities and organizations containing critical information has increased. One of the well-known methods of stealing such information is phishing attacks. At the same time, most users underestimate the severity of these attacks and do not pay enough attention to protection systems. This, in turn, leads to wider consequences. Therefore, the problem to be solved is to present a method for analyzing phishing messages that can be used to reduce the probability of reaching the goal of a phishing attack. At the same time, it is known that attackers improve and modify the methods of implementing attacks, and therefore, classifying phishing attacks to increase user awareness is an urgent task. The result of the work is the proposed classification of phishing attacks and the presented method for analyzing phishing messages.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.