Sheetal S., B.B.A. LL.B. (Hons.), School of Law, SASTRA Deemed University, Trichy- Tanjore Road, Thirumalaisamudiram, Thanjavur, Tamil Nadu
ABSTRACT
People are sharing their personal information in online more frequently as a result of the considerable increase in internet usage. As a result, fraudsters can access a great deal of personal data and financial transactions. A particularly successful type of cybercrime that allows criminals to trick people and steal crucial data is phishing. The phishing assault has developed into more complex attack vector since the first instance was published in 1990. Phishing is currently one of the most prevalent types of online fraud behavior. Phishing attacks can cause their victims to suffer significant losses, including the loss of confidential information, identity theft, business, and state secrets. By examining current phishing practices and assessing the state of phishing, Studies have categorized the phishing attacks in accordance with fundamental phishing methods and defenses, ignoring the significance of the entire phishing lifecycle. This article offers a fresh, in-depth model of phishing that takes into account attack stages, different types of attackers, threats, targets, attack media, and attacking strategies. The lifecycle of a phishing attack, which will raise awareness of these attacks and the strategies utilized as well as aid in the creation of an all-encompassing anti-phishing system.
Keywords: Phishing, Cyber-threat, Cyber-Crime, Credential information, Personal information
Comments