top of page

Phishing: Don’t Take The Bait




Sheetal S., B.B.A. LL.B. (Hons.), School of Law, SASTRA Deemed University, Trichy- Tanjore Road, Thirumalaisamudiram, Thanjavur, Tamil Nadu

ABSTRACT

People are sharing their personal information in online more frequently as a result of the considerable increase in internet usage. As a result, fraudsters can access a great deal of personal data and financial transactions. A particularly successful type of cybercrime that allows criminals to trick people and steal crucial data is phishing. The phishing assault has developed into more complex attack vector since the first instance was published in 1990. Phishing is currently one of the most prevalent types of online fraud behavior. Phishing attacks can cause their victims to suffer significant losses, including the loss of confidential information, identity theft, business, and state secrets. By examining current phishing practices and assessing the state of phishing, Studies have categorized the phishing attacks in accordance with fundamental phishing methods and defenses, ignoring the significance of the entire phishing lifecycle. This article offers a fresh, in-depth model of phishing that takes into account attack stages, different types of attackers, threats, targets, attack media, and attacking strategies. The lifecycle of a phishing attack, which will raise awareness of these attacks and the strategies utilized as well as aid in the creation of an all-encompassing anti-phishing system.

Keywords: Phishing, Cyber-threat, Cyber-Crime, Credential information, Personal information

Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Open Access Logo

Licensing:

​All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page