Access over 20 million homework & study documents

Phishing

Content type
User Generated
Subject
Engineering
Type
Homework
Rating
Showing Page:
1/8

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/8

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/8

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 8 pages?
Access Now
Unformatted Attachment Preview
Running head: PHISHING Phishing Christopher Hawthorne Professor Gayles Institution affiliation 2 PHISHING Phishing Phishing is a cybercrime whereby the victims or targets are lured into providing useful and confidential information through an email, telephone or text message. The attacker convinces the victim into believing that they are an organization or institution and they need the victim's sensitive information for useful or essential reasons. The information may include banking and credit card details, personally identifiable information or passwords. The information is then used for malicious reasons which may include access to important accounts and systems and can result in identity theft or loss of financial resources (Nirmal, Janet, & Kumar, 2015). The attackers use different strategies including a sense of urgency, attachments, hyperlinks or lucrative offers that attract the attention of the targets. Phishing is a great threat to information technology, and although technology experts have come up with ways to combat the threat, there are better strategies that can still be implemented. The threat of phishing Phishing has always been a threat to the information technology and is still a threat. The phishing threats in the past were extreme but as time went by, the threats increased. The current phishing threats are directed towards humans, data and other important information. Threats to employers Regardless of whether the work is online banking or a research p ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4