Access Millions of academic & study documents

Phishing

Content type
User Generated
Subject
Computer Science
School
University of the Cumberlands
Type
Homework
Showing Page:
1/3

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
1 Running head: PHISHING Phishing Name Institution PHISHING 2 Phishing Phishing could be described as any attempt in regards to obtaining specific sensitive information from someone. This sensitive information could be the passwords, the usernames or even the details of a credit card. There are couple of ways in which phishing takes place. The two common ways via which phishing occurs are through the instant messaging and through the emails. According to (Akerlof & Shiller, 2015), the most preferred way of dealing with phishing is via forwarding the message(s) to ones SPAM folder, that is, in case of the emails. With this, there could be an automatic detection of similar messages in future and they could be blocked instantly. In the circumstances where the phishing takes place via direct messaging, one is advised to report and block the user immediately. Yes, I admit that I have ev ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4