preview

A Report On The Communication

Good Essays

Figure 3: Phishing Example
This email appears to be from some com-pany domain, which is the social engi-neering approach of wanting to fake au-thenticity. The embedded message how-ever, talks about some order, which may be unknown to the target victim. There is scantly information except for the direc-tion link, which diverts the user into some other page, where he/she will possibly be, requested for the sensitive financial relat-ed information that will later be, used maliciously.
• The vagueness in the message, which normally is never, addressed by name di-rectly to the target. The message may purport from a reliable source like an or-ganization but may have scantly and in-accurate information that should pose mistrust.
• The target may not be having any associa-tion or dealings with the source of the in-formation.
• The communication in the message may have poor grammar/ or spelling. Odd phrases and typo errors are a common characteristic. The attackers are however, mastering the art of proficiency hence such mistakes are becoming less common. There are however, such careless mistakes being, made and such may be an im-portant lead to the user. Figure 4: Phishing Email with Spoofed Email Ad-dress; Poor Grammar; Luring Links and Inaccurate information
• The embedded communication is normal-ly so good for truth. It may have unrealis-tic threats or even an urgency sense.
• Commonly, the email address source may emulate the actual organization or faked source but will

Get Access