Journal of Students' Research in Technology & Management

  • Home
  • About
  • Login
  • Register
  • search
  • Current
  • Archives
  • Submissions
  • Announcements
  • Thesis Abstracts
Home / Vol 3, No 1 (2015) Shah

PHISHING: AN EVOLVING THREAT

Keyur Shah

Abstract


Phishing is one of the most common attacks used to extract sensitive information for malicious use. It is one of the easiest ways to extract confidential data on a large-scale. A fraudulent website/e-mail which looks very similar to the original is setup to trap the victim to give away confidential information. A large population of internet users still lacks knowledge to avoid phishing. When the phishing attacks are complimented with social engineering skills, the success rate is increased. Along with the progress of technology, phishing techniques have evolved encroaching upon newer communication mediums like voice and text messages giving rise to newer specialized forms of Phishing called - Vishing and SMSishing. In this paper, we also cover how to avoid being a victim of these attacks. One of the best promising methods to avoid Phishing is Zero Knowledge Authentication -ZeKo which immunes the user from phishing attacks.

Keywords


Phishing, Vishing, SMSishing, Social Engineering, ZeKo.

References


Paul Knickerbocker, Combating Phishing through Zero-Knowledge Authentication, Department of Computer and Information Science and the Graduate School of the University of Oregon

A Karakasiliotis, Assessing end-user awareness of social engineering and phishing, 7th Australian Information Warfare and Security Conference.

Aaron Dolan, Social Engineering, SANS Institute InfoSec Reading Room.

John Aycock, A Design for an anti-spear-phishing system, Virus Bulletin Conference 2007.

Rachna Dhamija, JD Tygar and Marti Hearst, Why Phishing Works, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Bookmark and Share


Copyright (c) 2015 Keyur Shah

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

ISSN: 2321-2543

x
Message

About The Author

Keyur Shah

Article Tools
Abstract
Print this article
Indexing metadata
How to cite item
Finding References
Review policy
Email this article (Login required)
Email the author (Login required)
Post a Comment (Login required)
Related Items
  • Author's work
  • Related studies
  • Book searches
  • Databases
  • Pay-per-view
  • Tech. reports
  • Patents
  • Standards
  • Online forums
  • Multimedia
  • Teaching files
  • Government policy
  • Media reports
  • Web search
Hide Show all
Journal Content

Browse
  • By Issue
  • By Author
  • By Title
  • Other Journals
Information
  • For Readers
  • For Authors
  • For Librarians

Editorial Team

Chief Editor: Dr. Firdouse R Khan, Sohar University, Oman

GCRI in Social Media 

   

GCRI on Academia Edu

Follow GIAP Journals on Academia.edu

Notifications
  • View
  • Subscribe

Related Journals

User

Indexed & Supported by

Managed Hosting, Support, and OJS Responsive Theme by:
OpenJournalSystems.com