z-logo
open-access-imgOpen Access
Study on Phishing Attacks
Author(s) -
Vaishnavi Bhavsar,
Aditya Kadlak,
Shabnam Sharma
Publication year - 2018
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2018918286
Subject(s) - phishing , hacker , password , computer science , computer security , credit card , personally identifiable information , social engineering (security) , internet privacy , keystroke logging , information sensitivity , world wide web , malware , the internet , payment
Now a day there is a lot of data security issues. Hackers are now very much expert in using their knowledge for hack into someone else’s system and grab the information. Phishing is one such type of methodologies which are used to acquire the information. Phishing is a cyber crime in which emails, telephone, text messages, personally identifiable information, banking details, credit card details, password is been targeted. Phishing is mainly a form of online identify theft. Social Engineering is being used by the phisher to steal victim’s personal data and the account details. This research paper gives a fair idea of phishing attack, the types of phishing attack through which the attacks are performed, detection and prevention towards it.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom