Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Phishing Technique

Print
PDF
IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research
© 2019 by IJCA Journal
ICAIM 2017 - Number 2
Year of Publication: 2019
Authors:
Mamta Patel
Vandana Patel
Hardik Pillai
Sreeja S. S.

Mamta Patel, Vandana Patel, Hardik Pillai and Sreeja S S.. Article: Phishing Technique. IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research ICAIM 2017(2):5-8, February 2019. Full text available. BibTeX

@article{key:article,
	author = {Mamta Patel and Vandana Patel and Hardik Pillai and Sreeja S. S.},
	title = {Article: Phishing Technique},
	journal = {IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research},
	year = {2019},
	volume = {ICAIM 2017},
	number = {2},
	pages = {5-8},
	month = {February},
	note = {Full text available}
}

Abstract

Phishing is fraud. In phishing the attacker tries to read or retrieve information of a person. In this technique, the target gets a massage that appears that it is sent by some known person or reputed organization. On clicking the links in the message, it will install the malware on targeted device which will direct the target to a malicious website set up to trick them into displaying their personal and financial information, such as passwords credit card details. It is very much popular with cyber-criminals. Because it is very easy to make someone into clicking malicious link and get the details out of them rather than trying to seek through in someone's computer. The person who tries to do phishing use social networking sites and many other sources of information to collect the information about the target's personal history, their activities.

References

  • The Antiphishing Working Group (2004) Home Page, www. anti-phishing. org
  • Verisign Home Page (2005), Anti-Phishing Solution, www. verisign. com/verisign-business- solutions/anti-phishing-solutions/
  • Sangani, Kris (September 2003). "The Battle Against Identity Theft". The Banker 70 (9): 53–54.
  • Matthew Dunlop, Stephen Groat, and David Shelly? GoldPhish: Using Images for Content-Based Phishing Analysis?, in proceedings of internet monitoring and protection(ICIMP), fifth international conference, Barcelona, Pages 123-128, 2010.