CFP last date
22 April 2024
Reseach Article

Phishing Technique

Published on February 2019 by Mamta Patel, Vandana Patel, Hardik Pillai, Sreeja S. S.
Leveraging Information Technology for Inter-Sectoral Research
Foundation of Computer Science USA
ICAIM2017 - Number 2
February 2019
Authors: Mamta Patel, Vandana Patel, Hardik Pillai, Sreeja S. S.
adb8ecba-b047-4a19-95d7-67b5e3c9887f

Mamta Patel, Vandana Patel, Hardik Pillai, Sreeja S. S. . Phishing Technique. Leveraging Information Technology for Inter-Sectoral Research. ICAIM2017, 2 (February 2019), 5-8.

@article{
author = { Mamta Patel, Vandana Patel, Hardik Pillai, Sreeja S. S. },
title = { Phishing Technique },
journal = { Leveraging Information Technology for Inter-Sectoral Research },
issue_date = { February 2019 },
volume = { ICAIM2017 },
number = { 2 },
month = { February },
year = { 2019 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/icaim2017/number2/30389-1719/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Leveraging Information Technology for Inter-Sectoral Research
%A Mamta Patel
%A Vandana Patel
%A Hardik Pillai
%A Sreeja S. S.
%T Phishing Technique
%J Leveraging Information Technology for Inter-Sectoral Research
%@ 0975-8887
%V ICAIM2017
%N 2
%P 5-8
%D 2019
%I International Journal of Computer Applications
Abstract

Phishing is fraud. In phishing the attacker tries to read or retrieve information of a person. In this technique, the target gets a massage that appears that it is sent by some known person or reputed organization. On clicking the links in the message, it will install the malware on targeted device which will direct the target to a malicious website set up to trick them into displaying their personal and financial information, such as passwords credit card details. It is very much popular with cyber-criminals. Because it is very easy to make someone into clicking malicious link and get the details out of them rather than trying to seek through in someone's computer. The person who tries to do phishing use social networking sites and many other sources of information to collect the information about the target's personal history, their activities.

References
  1. The Antiphishing Working Group (2004) Home Page, www. anti-phishing. org
  2. Verisign Home Page (2005), Anti-Phishing Solution, www. verisign. com/verisign-business- solutions/anti-phishing-solutions/
  3. Sangani, Kris (September 2003). "The Battle Against Identity Theft". The Banker 70 (9): 53–54.
  4. Matthew Dunlop, Stephen Groat, and David Shelly? GoldPhish: Using Images for Content-Based Phishing Analysis?, in proceedings of internet monitoring and protection(ICIMP), fifth international conference, Barcelona, Pages 123-128, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Anti-phishing Technologies Identity Theft Network Security Phishing Attacks