CRMN 3021U Chapter Notes - Chapter 4.5: Phishing, Email Spoofing, Online Identity

49 views2 pages

Document Summary

Banu, n. , banu, m. (2013) a comprehensive study of phishing attacks. Banu and banu (2013) explore phishing attacks and what exactly a phishing attack is. The authors begin by informing readers that phishing is now one of the highly used techniques in the world to steal data and perform fraudulent transactions. They define phishing as a form of online identity theft that aims to steal sensitive information such as online passwords and credit card information . The article then lists each form of phishing and explains what each means; beginning with clone phishing. Clone phishing is when a hacker find out what the victims frequently visited websites are, and makes cone copies of them. The purpose of this attack is to gain login credentials, which allows hackers to save them from the fake website in order to use them on the legitimate site. The second type of phishing is spear phishing.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents