scholarly journals E-mail-Based Phishing Attack Taxonomy

2020 ◽  
Vol 10 (7) ◽  
pp. 2363
Author(s):  
Justinas Rastenis ◽  
Simona Ramanauskaitė ◽  
Justinas Janulevičius ◽  
Antanas Čenys ◽  
Asta Slotkienė ◽  
...  

The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing. Phishing attacks seek to obtain a user’s personal or secret information. The variety of phishing attacks is very broad, and usage of novel, more sophisticated methods complicates its automated filtering. Therefore, it is important to form up-to-date and detailed phishing attack taxonomy, which could be used for both human education purposes as well as phishing attack discrete notation. In this paper, we propose an e-mail-based phishing attack taxonomy, which includes six phases of the attack. Each phase has at least one criterion for the attack categorization. Each category is described, and in some cases the categories have sub-classes to present the full variety of phishing attacks. The proposed taxonomy is compared to similar taxonomies. Our taxonomy outperforms other phishing attack taxonomies in numbers of phases, criteria and distinguished classes. Validation of the proposed taxonomy is achieved by adapting it as a phishing attack notation for an incident management system. Taxonomy usage for phishing attack notation increases the level of description of phishing attacks compared to free-form phishing attack descriptions.

Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


Author(s):  
Ramesh Palanisamy ◽  
Mohammed Tariq Shaikh ◽  
Senthil Jayapal ◽  
Darla Thomas

Nowadays phishing can be considered one of the simplest and oldest ways to steal important data from users on the internet. And only by collecting a small quantity of data about victim the attacker will be able to produce personalized and plausible e-mail. However, these days more ways that are trying to be found and new technologies are inventive to deal with phishing. In this paper, I will present type, cause, prevention measures and dynamic features for growing phishing attacks.


2009 ◽  
Vol 60 (1) ◽  
pp. 30
Author(s):  
Ralph L Scott

We have all become increasingly aware that, for commercial and perhaps other reasons, our use of the Internet can and is being tracked. For most of us this tracking has become a major concern as unwanted e-mail (commonly called SPAM) has begun to clog our incoming mailboxes.  There are a variety of ways to combat both the tracking and the receipt of unwanted e-mail. One of the ways of dealing with this problem is the use of an anonymiser service, many of which are available over the Web.


Author(s):  
Yasmin Bouarara

In today's world of globalization and technology without borders, the emergence of the internet and the rapid development of telecommunications have made the world a global village. Recently, the email service has become immensely used, and the main means of communication because it is cheap, reliable, fast, and easy to access. In addition, it allows users with a mailbox (BAL) and email address to exchange messages (images, files, and text documents) from anywhere in the world via the internet. Unfortunately, this technology has become undeniably the original source of malicious activity, in particular the problem of unwanted emails (spam), which has increased dramatically over the past decade. According to the latest report from Radicati Group, which provides quantitative and qualitative research with details of the e-mail, security, and social networks, published in 2012, 70-80% of email traffic consists of spam. The goal of the chapter is to give a state of the art on spam and spam techniques and the disadvantages of this phenomenon.


2011 ◽  
pp. 3340-3345
Author(s):  
Bruce Rollier ◽  
Fred Niederman

Although the Internet has been in existence since 1969, it was not widely used for educational purposes in its first two decades. Few students had access to e-mail, and few educators could visualize its value as a teaching tool. Programs to serve students from remote locations, often called “distance education,” became popular; these were generally delivered synchronously through television broadcasts and did not involve the Internet. When the World Wide Web was created in the early 1990s (Berners-Lee, 1999) and the first browsers became available (Waldrop, 2001), the enormous potential for education began to be recognized. New global users came online at a fantastic pace, and the value of all this connectivity was increasing even more rapidly in accordance with Metcalf’s Law (Gilder, 1996). Nearly all students used e-mail regularly, and college professors were putting syllabi and course assignments online and creating Web pages with increasing sophistication. Soon entire programs were offered completely via the Internet, with students from all over the globe taking courses together.


Author(s):  
Edward J. Szewczak

The collection of personal information by electronic technology (e-technology) and the possibility of misuse of that information are primary reasons why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of e-technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, and PC software. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world.


Author(s):  
Ioannis Tarnanas ◽  
Vassilios Kikis

That portion of the Internet known as the World Wide Web has been riding an exponential growth curve since 1994 (Network Wizards, 1999; Rutkowski, 1998), coinciding with the introduction of NCSA’s graphically based software interface Mosaic for “browsing” the World Wide Web (Hoffman, Novak, & Chatterjee 1995). Currently, over 43 million hosts are connected to the Internet worldwide (Network Wizards, 1999). In terms of individual users, somewhere between 40 to 80 million adults (eStats, 1999) in the United States alone have access to around 800 million unique pages of content (Lawrence & Giles, 1999), globally distributed on arguably one of the most important communication innovations in history. Yet even as the Internet races ambitiously toward critical mass, some social scientists have begun to examine carefully the policy implications of current demographic patterns of Internet access and usage (Hoffman & Novak, 1998; Hoffman, Kalsbeek, & Novak, 1996; Hoffman, Novak, & Venkatesh, 1997; Katz & Aspden, 1997; Wilhelm, 1998). Looming large is the concern that the Internet may not scale economically (Keller, 1996), leading to what Lloyd Morrisett, the former president of the Markle Foundation, has called a “digital divide” between the information “haves” and “have-nots.” For example, although almost 70% of the schools in this country have at least one computer connected to the Internet, less than 15% of classrooms have Internet access (Harmon, 1997). Not surprisingly, access is not distributed randomly, but correlated strongly with income and education (Coley, Cradler, & Engel 1997). A recent study of Internet use among college freshman (Sax, Astin, Korn, & Mahoney 1998) found that nearly 83% of all new college students report using the Internet for school work, and almost two-thirds use e-mail to communicate. Yet, closer examination suggests a disturbing disparity in access. While 90.2% of private college freshman use the Internet for research, only 77.6% of students entering public black colleges report doing so. Similarly, although 80.1% of private college freshman use e-mail regularly, only 41.4% of students attending black public colleges do. Further, although numerous studies (e.g., CyberAtlas, 1999; Maraganore & Morrisette, 1998) suggest that the gender gap in Internet use appears to be closing over time and that Internet users are increasingly coming from the ranks of those with lower education and income (Pew Research Center, 1998), the perception persists that the gap for race is not decreasing (Abrams, 1997). We now raise a series of points for further discussion. We believe these issues represent the most pressing unanswered questions concerning access and the impact of the digital divide on the emerging digital economy. This article is intended to stimulate discussion among scholars and policymakers interested in how differences in Internet access and use among different segments in our society affect their ability to participate and reap the rewards of that participation in the emerging digital economy. In summary, we have reviewed the most recent research investigating the relationship of race to Internet access and usage over time. Our objective is twofold: (1) to stimulate an informed discussion among scholars and policymakers interested in the issue of diversity on the Internet, and 2) to propose a research agenda that can address the many questions raised by this and related research.


2021 ◽  
Vol 1 (1) ◽  
pp. 127-133
Author(s):  
V Pratiwi ◽  
◽  
S L Rahman ◽  

The purpose of this study is to determine the positive effects of e-learning systems on improving student's understanding of concepts and comparing e-learning with old learning system. Nowadays, the internet is one of the way to find informations easily without reading books and attending classes. The method used in this research is literature study method by obtaining information and data from various sources. The results from this study is that e-learning can improve students' cognitive abilitiesas it is easier to access words, powerpoint, html or PDF in the application. The conclusion is that e-learning can be used as a learning innovation that can help teachers and students using the Software Learning Management System


Sign in / Sign up

Export Citation Format

Share Document