Introduction to the Types of Phishing Attacks

Understanding the Evolution and Impact of Phishing Attacks

Authors

  • Nisha Ahuja Punjab Technical University Author
  • Dr. Shewata Rani Author

Keywords:

phishing attacks, network security, attackers, innovative courses, exploit systems, new technologies, email viruses, self-spreading worms, online services, electronic business, data theft attacks, technology, attention

Abstract

Themost recent two decades of network security research have showed that attackersare consistently developing, investigating inventive courses to adventureframeworks, and focusing on new innovations and benefits as they rise. Inreality, the widespread utilization of message carried spam and emailviruses;broadband connectivity was accompanied by the ascent of quick self-spreadingworms; while the growing utilization of online particular administrations andelectronic business came about in refined particular information robberyattacks, incorporating phishing. Such patterns infer that any engineering thatachieves a basic mass will pull in the consideration of attackers.

Downloads

Download data is not yet available.

Downloads

Published

2013-02-01