Introduction to the Types of Phishing Attacks
Understanding the Evolution and Impact of Phishing Attacks
Keywords:
phishing attacks, network security, attackers, innovative courses, exploit systems, new technologies, email viruses, self-spreading worms, online services, electronic business, data theft attacks, technology, attentionAbstract
Themost recent two decades of network security research have showed that attackersare consistently developing, investigating inventive courses to adventureframeworks, and focusing on new innovations and benefits as they rise. Inreality, the widespread utilization of message carried spam and emailviruses;broadband connectivity was accompanied by the ascent of quick self-spreadingworms; while the growing utilization of online particular administrations andelectronic business came about in refined particular information robberyattacks, incorporating phishing. Such patterns infer that any engineering thatachieves a basic mass will pull in the consideration of attackers.Downloads
Download data is not yet available.
Published
2013-02-01
Issue
Section
Articles