preview

The Pros And Cons Of Phishing

Decent Essays

Nowadays, the most popular electronic medium that is widely used to transfer the message from one node to another node all over the world is internet. Most of the people or organizations use internet for secure message communication. However, there also are people with criminal intent. The number of persons with malicious or criminal intents are increasing day by day. These people do cybercriminal activity and commit fraud. Out of various cybercrimes, one of the most popular cybercrime today is Phishing. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication [1].Phishing is usually …show more content…

Then the user is lured to give upon his personal details like usernames and passwords. Mostly the phishing attack is done via email that is attacker sends a cloned or fake email to the victim with a forged source address. A cloned email is made by using a legitimate, and previously delivered, email containing an attachment or link .Its content and recipient address (es) are taken and used to create an almost identical email. The attachment or Link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender. It may claim to be a resend of the original or an updated version to the original. Phishing uses some form of technical deception designed to make a link in an email (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by …show more content…

• Key Loggers Key loggers refer to the malware which captures inputs from the keyboard. The information is sent to the hackers and are further used for malicious activities[2].

• Content Injection Content injection is the technique where the phisher changes a part of the content on the page of a reliable website. Thus the victim treats that fake content on the website to be original[2].

• Phone Phishing In phone phishing, the phisher makes phone calls to the user and asks the user to dial a number. The purpose is to get personal information of the bank account through the phone. Phone phishing is mostly done with a fake caller ID[2].
1.1.3Effects of Phishing
There are various effects of phishing which include –
• Identity theft
• E-commerce fraud
• Monetary loss to the original institutions
• Loss of Public Trust [3].

1.1.4Characterstics of Phishing Attack

• Uninvited requests for sensitive information In a phishing attack, the attacker asks victim to provide his personal information. Although that information is not needed at that point of time by

Get Access